Analysis
-
max time kernel
143s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 01:14
Behavioral task
behavioral1
Sample
09be6f4e7ce95571c29172df4bfff00c.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
09be6f4e7ce95571c29172df4bfff00c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
09be6f4e7ce95571c29172df4bfff00c.exe
-
Size
5.8MB
-
MD5
09be6f4e7ce95571c29172df4bfff00c
-
SHA1
00698a702ca3724cefff129b2048f2cd20f3c255
-
SHA256
9a845ae4275753299ee4f8cb0b02fc96939eefb2881acc9248c475d9df04ea1b
-
SHA512
05602486736f00285a90f82355c58301069451f740772c2e6e917293e0bba0367faf5f1d999345e1a448aedb05aa894d0446b3feee8697f6f410944e66806b0f
-
SSDEEP
98304:uLbXWMq53fSqTpOFHau42c1joCjMPkNwk6alDAqD7z3uboHau42c1joCjMPkNwk6:uvGZ3f1Ixauq1jI86FA7y2auq1jI86
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3704 09be6f4e7ce95571c29172df4bfff00c.exe -
Executes dropped EXE 1 IoCs
pid Process 3704 09be6f4e7ce95571c29172df4bfff00c.exe -
resource yara_rule behavioral2/memory/1920-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1920 09be6f4e7ce95571c29172df4bfff00c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1920 09be6f4e7ce95571c29172df4bfff00c.exe 3704 09be6f4e7ce95571c29172df4bfff00c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1920 wrote to memory of 3704 1920 09be6f4e7ce95571c29172df4bfff00c.exe 18 PID 1920 wrote to memory of 3704 1920 09be6f4e7ce95571c29172df4bfff00c.exe 18 PID 1920 wrote to memory of 3704 1920 09be6f4e7ce95571c29172df4bfff00c.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\09be6f4e7ce95571c29172df4bfff00c.exe"C:\Users\Admin\AppData\Local\Temp\09be6f4e7ce95571c29172df4bfff00c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\09be6f4e7ce95571c29172df4bfff00c.exeC:\Users\Admin\AppData\Local\Temp\09be6f4e7ce95571c29172df4bfff00c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3704
-