Analysis
-
max time kernel
142s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 07:21
Behavioral task
behavioral1
Sample
1201efb6ba5b939afc31dfd58ffa5cb3.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
1201efb6ba5b939afc31dfd58ffa5cb3.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
1201efb6ba5b939afc31dfd58ffa5cb3.exe
-
Size
1.5MB
-
MD5
1201efb6ba5b939afc31dfd58ffa5cb3
-
SHA1
e3dee064dbab2f8675447a7784dd41441bd360d5
-
SHA256
36ba8995f2c5d84444d060c9c042c1a216b72fcbd0fc7fc2d740e1ada284e814
-
SHA512
665abfc67cd18b55f68f5e4da9c6e134417e62d963efe6593a228dff5825112e5bd765e360e0884a9ce904f7449c928c2c058c59660995b46be5df3d65d36def
-
SSDEEP
24576:oWGmakcorBGOMOoO569sCWZQknasaf+Fu4gIloi5oLX95sPQMGwqF2yGIDKHaQiW:lGytrBPFoO569Cak/aWFBF5oDzs1Gwq5
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4984 1201efb6ba5b939afc31dfd58ffa5cb3.exe -
Executes dropped EXE 1 IoCs
pid Process 4984 1201efb6ba5b939afc31dfd58ffa5cb3.exe -
resource yara_rule behavioral2/memory/4376-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4376 1201efb6ba5b939afc31dfd58ffa5cb3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4376 1201efb6ba5b939afc31dfd58ffa5cb3.exe 4984 1201efb6ba5b939afc31dfd58ffa5cb3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4376 wrote to memory of 4984 4376 1201efb6ba5b939afc31dfd58ffa5cb3.exe 17 PID 4376 wrote to memory of 4984 4376 1201efb6ba5b939afc31dfd58ffa5cb3.exe 17 PID 4376 wrote to memory of 4984 4376 1201efb6ba5b939afc31dfd58ffa5cb3.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\1201efb6ba5b939afc31dfd58ffa5cb3.exe"C:\Users\Admin\AppData\Local\Temp\1201efb6ba5b939afc31dfd58ffa5cb3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\1201efb6ba5b939afc31dfd58ffa5cb3.exeC:\Users\Admin\AppData\Local\Temp\1201efb6ba5b939afc31dfd58ffa5cb3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4984
-