Analysis
-
max time kernel
1s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 01:16
Behavioral task
behavioral1
Sample
22af3f26f9fe1c031879c48fbe402a75.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
22af3f26f9fe1c031879c48fbe402a75.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
22af3f26f9fe1c031879c48fbe402a75.exe
-
Size
302KB
-
MD5
22af3f26f9fe1c031879c48fbe402a75
-
SHA1
3babf3255fc2bc81e9e985fc18d5bbb748d496cc
-
SHA256
909dda5a786bda3c0c4d0193c7411af499d5498da2f1025b4b2fa36d4879dff5
-
SHA512
0ad255e18b80e16574509e03cb9da267dacd0fa0083daa5e6fad79ba0c0ab475086646ac19950a35c08434ac17a692f1f847e2474f7b0b57414f044ad8fea5dc
-
SSDEEP
6144:9sDMTR32Ng2dkX/OzfbkpFOFBXxY4Gz0BqKPidbTmQ:9732DdOMfYvOzXxYJz03wXm
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2360 22af3f26f9fe1c031879c48fbe402a75.exe -
Executes dropped EXE 1 IoCs
pid Process 2360 22af3f26f9fe1c031879c48fbe402a75.exe -
resource yara_rule behavioral2/memory/872-0-0x0000000000400000-0x00000000004E0000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 872 22af3f26f9fe1c031879c48fbe402a75.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 872 22af3f26f9fe1c031879c48fbe402a75.exe 2360 22af3f26f9fe1c031879c48fbe402a75.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 872 wrote to memory of 2360 872 22af3f26f9fe1c031879c48fbe402a75.exe 20 PID 872 wrote to memory of 2360 872 22af3f26f9fe1c031879c48fbe402a75.exe 20 PID 872 wrote to memory of 2360 872 22af3f26f9fe1c031879c48fbe402a75.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\22af3f26f9fe1c031879c48fbe402a75.exe"C:\Users\Admin\AppData\Local\Temp\22af3f26f9fe1c031879c48fbe402a75.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\22af3f26f9fe1c031879c48fbe402a75.exeC:\Users\Admin\AppData\Local\Temp\22af3f26f9fe1c031879c48fbe402a75.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2360
-