Analysis
-
max time kernel
137s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 20:28
Behavioral task
behavioral1
Sample
1bd74fc18f86b50ecf1d4cd34442ac32.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
1bd74fc18f86b50ecf1d4cd34442ac32.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
1bd74fc18f86b50ecf1d4cd34442ac32.exe
-
Size
2.7MB
-
MD5
1bd74fc18f86b50ecf1d4cd34442ac32
-
SHA1
863a287e206e977ceacb46691f190c7f4fb28d75
-
SHA256
9b5aa62c8444bfa39a972ff9058927e0a9e70cfec7fc9536995ceeb1e291e789
-
SHA512
6f1c193617bc3b7345152781308f028a0be11ae14263e4e00e5f9372e8eb5d61e4a385cdac0bef19e8f2b2289bbbe7ff2a85b84027e9b3f8fafa561b20fb385e
-
SSDEEP
49152:vKug24woXXdHORZz83aEqNVcQzuhIpwlGkAAE0e5kbS:224bN6ZGaEqKsxAEh5kbS
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2664 1bd74fc18f86b50ecf1d4cd34442ac32.exe -
Executes dropped EXE 1 IoCs
pid Process 2664 1bd74fc18f86b50ecf1d4cd34442ac32.exe -
resource yara_rule behavioral2/files/0x000300000001e982-13.dat upx behavioral2/memory/2664-16-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/memory/744-0-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 744 1bd74fc18f86b50ecf1d4cd34442ac32.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 744 1bd74fc18f86b50ecf1d4cd34442ac32.exe 2664 1bd74fc18f86b50ecf1d4cd34442ac32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 744 wrote to memory of 2664 744 1bd74fc18f86b50ecf1d4cd34442ac32.exe 18 PID 744 wrote to memory of 2664 744 1bd74fc18f86b50ecf1d4cd34442ac32.exe 18 PID 744 wrote to memory of 2664 744 1bd74fc18f86b50ecf1d4cd34442ac32.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bd74fc18f86b50ecf1d4cd34442ac32.exe"C:\Users\Admin\AppData\Local\Temp\1bd74fc18f86b50ecf1d4cd34442ac32.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\1bd74fc18f86b50ecf1d4cd34442ac32.exeC:\Users\Admin\AppData\Local\Temp\1bd74fc18f86b50ecf1d4cd34442ac32.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2664
-