Analysis
-
max time kernel
147s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 14:24
Behavioral task
behavioral1
Sample
1b552cc61055fe6c5340cbdf34b9b49b.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
1b552cc61055fe6c5340cbdf34b9b49b.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
1b552cc61055fe6c5340cbdf34b9b49b.exe
-
Size
1.5MB
-
MD5
1b552cc61055fe6c5340cbdf34b9b49b
-
SHA1
a720409ef0c1982447781e4eab5f70470ee35969
-
SHA256
b44599f767f2ba219673d0e336fdc432877d3e269b8ae624c32481e43e770e2a
-
SHA512
6e153acc7df50046c5576f8a078b2b8f7e2a1f0b4d53bee176d71c0c6e1a354b5150e7d4222a14608c1c7d2efeb0000c8c744892c716a27ca0e29f2eda0f5962
-
SSDEEP
24576:xkZ6Nill/FlkvOvTbaPDQPsoIAtWK76pJfnnufPwjDgBNWcD6x9DjeQMD77QW:x46NYXlMObbaPD8sWWjfnnuHAKNWcD6r
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1908 1b552cc61055fe6c5340cbdf34b9b49b.exe -
Executes dropped EXE 1 IoCs
pid Process 1908 1b552cc61055fe6c5340cbdf34b9b49b.exe -
resource yara_rule behavioral2/memory/1908-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/3780-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3780 1b552cc61055fe6c5340cbdf34b9b49b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3780 1b552cc61055fe6c5340cbdf34b9b49b.exe 1908 1b552cc61055fe6c5340cbdf34b9b49b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3780 wrote to memory of 1908 3780 1b552cc61055fe6c5340cbdf34b9b49b.exe 17 PID 3780 wrote to memory of 1908 3780 1b552cc61055fe6c5340cbdf34b9b49b.exe 17 PID 3780 wrote to memory of 1908 3780 1b552cc61055fe6c5340cbdf34b9b49b.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b552cc61055fe6c5340cbdf34b9b49b.exe"C:\Users\Admin\AppData\Local\Temp\1b552cc61055fe6c5340cbdf34b9b49b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\1b552cc61055fe6c5340cbdf34b9b49b.exeC:\Users\Admin\AppData\Local\Temp\1b552cc61055fe6c5340cbdf34b9b49b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1908
-