Analysis
-
max time kernel
154s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 04:16
Behavioral task
behavioral1
Sample
0e25ca2be8de8d937162c044ecb1b6da.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
0e25ca2be8de8d937162c044ecb1b6da.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
0e25ca2be8de8d937162c044ecb1b6da.exe
-
Size
1.5MB
-
MD5
0e25ca2be8de8d937162c044ecb1b6da
-
SHA1
2cb1b3eaf9547a3a6dc80bfdfd52abbcfc39900b
-
SHA256
2a35481e6304d89abc91a396547502fb107f39b46162815021cffec105c81022
-
SHA512
a79cc2bee0f40b43ce872bc9c6d2704913e77bceec8fa88e447d11c766323a94e3aa52478fa683fd21f28b63c4f159e5eb1ea2417420d709acae7d2aa939490c
-
SSDEEP
24576:x5CyIbYHpJKE7Yql5xa6CFDiGrMHaFeCS4uvQ+vFW:xYbg7Yql7axZXrMHoS4uY+vF
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2752 0e25ca2be8de8d937162c044ecb1b6da.exe -
Executes dropped EXE 1 IoCs
pid Process 2752 0e25ca2be8de8d937162c044ecb1b6da.exe -
resource yara_rule behavioral2/memory/2888-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/2752-12-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2888 0e25ca2be8de8d937162c044ecb1b6da.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2888 0e25ca2be8de8d937162c044ecb1b6da.exe 2752 0e25ca2be8de8d937162c044ecb1b6da.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2752 2888 0e25ca2be8de8d937162c044ecb1b6da.exe 90 PID 2888 wrote to memory of 2752 2888 0e25ca2be8de8d937162c044ecb1b6da.exe 90 PID 2888 wrote to memory of 2752 2888 0e25ca2be8de8d937162c044ecb1b6da.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e25ca2be8de8d937162c044ecb1b6da.exe"C:\Users\Admin\AppData\Local\Temp\0e25ca2be8de8d937162c044ecb1b6da.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\0e25ca2be8de8d937162c044ecb1b6da.exeC:\Users\Admin\AppData\Local\Temp\0e25ca2be8de8d937162c044ecb1b6da.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2752
-