Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 09:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
148f8639e8a229c6f402a21ca05c3f53.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
148f8639e8a229c6f402a21ca05c3f53.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
148f8639e8a229c6f402a21ca05c3f53.exe
-
Size
385KB
-
MD5
148f8639e8a229c6f402a21ca05c3f53
-
SHA1
036429883524f869f56261eeb479b1d27803471c
-
SHA256
1284a5aaf6af962ddaf101e64745eeed511bac58445900b6fc69460296bb8d3b
-
SHA512
c74b0af2fe3830e9b842e519340bb6453c90225344dacd2fe59dc4185a56ba8dd3553136f66b9bfb1359a2f9b611dacd64d17f54b78f40b287220954671fea0e
-
SSDEEP
6144:RwI+aOJVjaVKpmIkvuYBV0foxznzcpPxPmVmZYq+iTgxXTlKVE4sOy8x8IB:+ragw7hvuYB9zWJPmViYeTg554sCx8IB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2240 148f8639e8a229c6f402a21ca05c3f53.exe -
Executes dropped EXE 1 IoCs
pid Process 2240 148f8639e8a229c6f402a21ca05c3f53.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4152 148f8639e8a229c6f402a21ca05c3f53.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4152 148f8639e8a229c6f402a21ca05c3f53.exe 2240 148f8639e8a229c6f402a21ca05c3f53.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4152 wrote to memory of 2240 4152 148f8639e8a229c6f402a21ca05c3f53.exe 16 PID 4152 wrote to memory of 2240 4152 148f8639e8a229c6f402a21ca05c3f53.exe 16 PID 4152 wrote to memory of 2240 4152 148f8639e8a229c6f402a21ca05c3f53.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\148f8639e8a229c6f402a21ca05c3f53.exe"C:\Users\Admin\AppData\Local\Temp\148f8639e8a229c6f402a21ca05c3f53.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\148f8639e8a229c6f402a21ca05c3f53.exeC:\Users\Admin\AppData\Local\Temp\148f8639e8a229c6f402a21ca05c3f53.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2240
-