Analysis
-
max time kernel
112s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 06:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
113fdd8c5a2680c502a4ecfc67932ab7.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
113fdd8c5a2680c502a4ecfc67932ab7.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
113fdd8c5a2680c502a4ecfc67932ab7.exe
-
Size
57KB
-
MD5
113fdd8c5a2680c502a4ecfc67932ab7
-
SHA1
f78e2bee8ade6790d4125024a3c57ac7bb7122ce
-
SHA256
120acd6e1c00d7e47bf3b4a8bfb9af1254a3763cc3b3e0e7821a811166cce249
-
SHA512
5df8ca4fa701b84376fe6486448e6c5d94b02fd629d6a52b744b89fd301bc6aaea82e8d346079d2a1439c8fe30095e3496ae349aec00d70a6427b5c56a409d72
-
SSDEEP
1536:WR2CP6M9mli6pxDYcWXsZBcN6G5lW1zFNBL5gPxCyNjcs/0:OV6Nl7YcWXsZHGSrLCPLmz
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1952 113fdd8c5a2680c502a4ecfc67932ab7.exe -
Executes dropped EXE 1 IoCs
pid Process 1952 113fdd8c5a2680c502a4ecfc67932ab7.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3896 113fdd8c5a2680c502a4ecfc67932ab7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3896 113fdd8c5a2680c502a4ecfc67932ab7.exe 1952 113fdd8c5a2680c502a4ecfc67932ab7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3896 wrote to memory of 1952 3896 113fdd8c5a2680c502a4ecfc67932ab7.exe 20 PID 3896 wrote to memory of 1952 3896 113fdd8c5a2680c502a4ecfc67932ab7.exe 20 PID 3896 wrote to memory of 1952 3896 113fdd8c5a2680c502a4ecfc67932ab7.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\113fdd8c5a2680c502a4ecfc67932ab7.exe"C:\Users\Admin\AppData\Local\Temp\113fdd8c5a2680c502a4ecfc67932ab7.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\113fdd8c5a2680c502a4ecfc67932ab7.exeC:\Users\Admin\AppData\Local\Temp\113fdd8c5a2680c502a4ecfc67932ab7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1952
-