Analysis
-
max time kernel
2s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 22:44
Behavioral task
behavioral1
Sample
3b40cf3b84766eb09ae4a8f5cbd4d52e.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
3b40cf3b84766eb09ae4a8f5cbd4d52e.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
3b40cf3b84766eb09ae4a8f5cbd4d52e.exe
-
Size
10.2MB
-
MD5
3b40cf3b84766eb09ae4a8f5cbd4d52e
-
SHA1
79703ba86fb0815f6ceeebbd93fd64af4d65e51e
-
SHA256
3a0e301f6996b1d2ec33b992d46bed0eed1272cee5447c3e1d53e933df6cd09f
-
SHA512
0151140ef80e88260426eaeb304f3beb88801d68b091a8c4c46a6cac769ff48593d397aaf416b78b5bd72a66785234f2239357ba7edc2e0c4904b59314cf7dba
-
SSDEEP
98304:nJf9jblCo5yjVkwp3xPsCPCnJE/JT/p9T3cmHEVPxNUYgKV23xPsCPCnJE/JT/pF:J1jbEoisCPWc19dKQPK8sCPWc19
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5032 3b40cf3b84766eb09ae4a8f5cbd4d52e.exe -
Executes dropped EXE 1 IoCs
pid Process 5032 3b40cf3b84766eb09ae4a8f5cbd4d52e.exe -
resource yara_rule behavioral2/memory/1184-0-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral2/memory/5032-16-0x0000000000400000-0x0000000000D9E000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1184 3b40cf3b84766eb09ae4a8f5cbd4d52e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1184 3b40cf3b84766eb09ae4a8f5cbd4d52e.exe 5032 3b40cf3b84766eb09ae4a8f5cbd4d52e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1184 wrote to memory of 5032 1184 3b40cf3b84766eb09ae4a8f5cbd4d52e.exe 18 PID 1184 wrote to memory of 5032 1184 3b40cf3b84766eb09ae4a8f5cbd4d52e.exe 18 PID 1184 wrote to memory of 5032 1184 3b40cf3b84766eb09ae4a8f5cbd4d52e.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b40cf3b84766eb09ae4a8f5cbd4d52e.exe"C:\Users\Admin\AppData\Local\Temp\3b40cf3b84766eb09ae4a8f5cbd4d52e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\3b40cf3b84766eb09ae4a8f5cbd4d52e.exeC:\Users\Admin\AppData\Local\Temp\3b40cf3b84766eb09ae4a8f5cbd4d52e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5032
-