Analysis
-
max time kernel
144s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 00:40
Behavioral task
behavioral1
Sample
220a064f8506702ef9d9e829ebdf5d8b.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
220a064f8506702ef9d9e829ebdf5d8b.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
220a064f8506702ef9d9e829ebdf5d8b.exe
-
Size
1.3MB
-
MD5
220a064f8506702ef9d9e829ebdf5d8b
-
SHA1
caddf738eb2e439a981e5729de16cfdc41a30988
-
SHA256
bc67ecedbad5173af79c0cdf57295cabf63032c24a4a5fefb842ca573bf4b783
-
SHA512
2d3044bafd34dc60d1359bb50688f6b9ec2ef2adfa252e147f69462e4b3556c00ee711bca5b610d434dc45b49f28025476125d78841b5738bc3fdf2b8dab21a8
-
SSDEEP
24576:zqxuUkJNx4lRehW9fgU00ED3bEn/5QISvu6dmJoMxCNKcjBUMmoKvPm+HxU9/9Us:+4UkJN+lR0W9fTgCxQzNdDMxajB6m+He
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2368 220a064f8506702ef9d9e829ebdf5d8b.exe -
Executes dropped EXE 1 IoCs
pid Process 2368 220a064f8506702ef9d9e829ebdf5d8b.exe -
resource yara_rule behavioral2/memory/2368-14-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/memory/1984-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1984 220a064f8506702ef9d9e829ebdf5d8b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1984 220a064f8506702ef9d9e829ebdf5d8b.exe 2368 220a064f8506702ef9d9e829ebdf5d8b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2368 1984 220a064f8506702ef9d9e829ebdf5d8b.exe 18 PID 1984 wrote to memory of 2368 1984 220a064f8506702ef9d9e829ebdf5d8b.exe 18 PID 1984 wrote to memory of 2368 1984 220a064f8506702ef9d9e829ebdf5d8b.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\220a064f8506702ef9d9e829ebdf5d8b.exe"C:\Users\Admin\AppData\Local\Temp\220a064f8506702ef9d9e829ebdf5d8b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\220a064f8506702ef9d9e829ebdf5d8b.exeC:\Users\Admin\AppData\Local\Temp\220a064f8506702ef9d9e829ebdf5d8b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2368
-