Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 07:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
12ba348b036e4fd332ed49ba51d5146b.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
12ba348b036e4fd332ed49ba51d5146b.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
12ba348b036e4fd332ed49ba51d5146b.exe
-
Size
771KB
-
MD5
12ba348b036e4fd332ed49ba51d5146b
-
SHA1
96ea5bfd780d07c319e7dbeca747b9db449cd24a
-
SHA256
1a7d693afaa7086323ba9173204bba2982472888e3b6105542ee3d8a8c404292
-
SHA512
4144723df74d565f1ea0d34dbc559608a20f742f65108d9d87b547c008b23ac3b99de6f6e04e982b7514423438d042e45b6814d24aaa560c7bcaf6524e0a1c8d
-
SSDEEP
24576:tb6KWXjxfimVpCgt1VjLb10hJaothZ2/T6FBBB:tSXjxqOlj3/ofT
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2164 12ba348b036e4fd332ed49ba51d5146b.exe -
Executes dropped EXE 1 IoCs
pid Process 2164 12ba348b036e4fd332ed49ba51d5146b.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4032 12ba348b036e4fd332ed49ba51d5146b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4032 12ba348b036e4fd332ed49ba51d5146b.exe 2164 12ba348b036e4fd332ed49ba51d5146b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4032 wrote to memory of 2164 4032 12ba348b036e4fd332ed49ba51d5146b.exe 24 PID 4032 wrote to memory of 2164 4032 12ba348b036e4fd332ed49ba51d5146b.exe 24 PID 4032 wrote to memory of 2164 4032 12ba348b036e4fd332ed49ba51d5146b.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\12ba348b036e4fd332ed49ba51d5146b.exe"C:\Users\Admin\AppData\Local\Temp\12ba348b036e4fd332ed49ba51d5146b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\12ba348b036e4fd332ed49ba51d5146b.exeC:\Users\Admin\AppData\Local\Temp\12ba348b036e4fd332ed49ba51d5146b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2164
-