Analysis
-
max time kernel
140s -
max time network
62s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 01:36
Behavioral task
behavioral1
Sample
0a4badde2dca16801fd13d5248cfb758.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
0a4badde2dca16801fd13d5248cfb758.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
0a4badde2dca16801fd13d5248cfb758.exe
-
Size
1.5MB
-
MD5
0a4badde2dca16801fd13d5248cfb758
-
SHA1
dc022b47a6d6576e30bb0ae787d7be57e504699b
-
SHA256
72a7b91d902bdbbc8f0635f37d28eb2eebf5994ce6dee7f47e55bda39a684fb5
-
SHA512
8d7c410a77cbc6d0ba962101346e528a3a935a52ef64f1a0f20c8db8fa7b1f93e32887108475ff3a524d561f3953ac2bc4b3a6916a55a5a135dd4fe40f81c032
-
SSDEEP
24576:R3h5HCIwoQc+fZxCPf5Z3g/7+zWia/IQy4D3sWURYivTsO2ABsWS2GpHW:R3h5iI/QcgrCZtRz7a/By47sP6ivTs4S
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3232 0a4badde2dca16801fd13d5248cfb758.exe -
Executes dropped EXE 1 IoCs
pid Process 3232 0a4badde2dca16801fd13d5248cfb758.exe -
resource yara_rule behavioral2/memory/3480-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/3232-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3480 0a4badde2dca16801fd13d5248cfb758.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3480 0a4badde2dca16801fd13d5248cfb758.exe 3232 0a4badde2dca16801fd13d5248cfb758.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3480 wrote to memory of 3232 3480 0a4badde2dca16801fd13d5248cfb758.exe 19 PID 3480 wrote to memory of 3232 3480 0a4badde2dca16801fd13d5248cfb758.exe 19 PID 3480 wrote to memory of 3232 3480 0a4badde2dca16801fd13d5248cfb758.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a4badde2dca16801fd13d5248cfb758.exe"C:\Users\Admin\AppData\Local\Temp\0a4badde2dca16801fd13d5248cfb758.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\0a4badde2dca16801fd13d5248cfb758.exeC:\Users\Admin\AppData\Local\Temp\0a4badde2dca16801fd13d5248cfb758.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3232
-