Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 12:26
Behavioral task
behavioral1
Sample
187a5ed213f254558e718d8cdba2b2ba.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
187a5ed213f254558e718d8cdba2b2ba.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
187a5ed213f254558e718d8cdba2b2ba.exe
-
Size
3.9MB
-
MD5
187a5ed213f254558e718d8cdba2b2ba
-
SHA1
7f8e30a79e4094d5c1b2b7618128da1dfca7aa2f
-
SHA256
63dead63fe0e992711422cd72ece0c96d2344d802b5a177230e118af289480b9
-
SHA512
759fb4b858f03bcec06f6030ab1c6eac8d5c10d6c31d1a1dac91fb70fc2acebb325b2984d99b1031fc850f92ef82b8948288d2759f865f2fc09a88125eade136
-
SSDEEP
98304:1831VKWWosnt4FU7G6GFgg3gnl/IVUt4pJWzZtIygg3gnl/IVUV:18FVlgk5gl/iwgWttJgl/iG
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2028 187a5ed213f254558e718d8cdba2b2ba.exe -
Executes dropped EXE 1 IoCs
pid Process 2028 187a5ed213f254558e718d8cdba2b2ba.exe -
resource yara_rule behavioral2/memory/4064-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/2028-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4064 187a5ed213f254558e718d8cdba2b2ba.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4064 187a5ed213f254558e718d8cdba2b2ba.exe 2028 187a5ed213f254558e718d8cdba2b2ba.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4064 wrote to memory of 2028 4064 187a5ed213f254558e718d8cdba2b2ba.exe 18 PID 4064 wrote to memory of 2028 4064 187a5ed213f254558e718d8cdba2b2ba.exe 18 PID 4064 wrote to memory of 2028 4064 187a5ed213f254558e718d8cdba2b2ba.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\187a5ed213f254558e718d8cdba2b2ba.exe"C:\Users\Admin\AppData\Local\Temp\187a5ed213f254558e718d8cdba2b2ba.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\187a5ed213f254558e718d8cdba2b2ba.exeC:\Users\Admin\AppData\Local\Temp\187a5ed213f254558e718d8cdba2b2ba.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2028
-