Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 13:49
Behavioral task
behavioral1
Sample
1a8f64f8f63ab032af32478f6590073d.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
1a8f64f8f63ab032af32478f6590073d.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
1a8f64f8f63ab032af32478f6590073d.exe
-
Size
1.3MB
-
MD5
1a8f64f8f63ab032af32478f6590073d
-
SHA1
21633f9467b1045e0d92ec3ae0370ea9eafd254c
-
SHA256
b76fb23b6408e67ea1bf542e4b6bd4440a95055194869bd8be4ae3024ead553e
-
SHA512
0c01591cb7e1a1330b38f1340c3b11bd2dad8e0bfe24a016e79c43308e9ba52c34c09d5b8157d7a07000762bb00ed1e1cedd13b6191eea00e8e35521e5a15d14
-
SSDEEP
24576:7ZFiL4zAexTm/87keNgUlKZdvjWhAKb4LMEEf1V/3G1HsBLF2DqXkV9NYumvG:764zbNXi5WqKbskT3G1MBLF2+0pY
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4876 1a8f64f8f63ab032af32478f6590073d.exe -
Executes dropped EXE 1 IoCs
pid Process 4876 1a8f64f8f63ab032af32478f6590073d.exe -
resource yara_rule behavioral2/memory/2944-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/memory/4876-15-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2944 1a8f64f8f63ab032af32478f6590073d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2944 1a8f64f8f63ab032af32478f6590073d.exe 4876 1a8f64f8f63ab032af32478f6590073d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2944 wrote to memory of 4876 2944 1a8f64f8f63ab032af32478f6590073d.exe 26 PID 2944 wrote to memory of 4876 2944 1a8f64f8f63ab032af32478f6590073d.exe 26 PID 2944 wrote to memory of 4876 2944 1a8f64f8f63ab032af32478f6590073d.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a8f64f8f63ab032af32478f6590073d.exe"C:\Users\Admin\AppData\Local\Temp\1a8f64f8f63ab032af32478f6590073d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\1a8f64f8f63ab032af32478f6590073d.exeC:\Users\Admin\AppData\Local\Temp\1a8f64f8f63ab032af32478f6590073d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4876
-