Analysis
-
max time kernel
148s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:41
Behavioral task
behavioral1
Sample
24d9efd01b613eea96198d8ced69c61f.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
24d9efd01b613eea96198d8ced69c61f.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
24d9efd01b613eea96198d8ced69c61f.exe
-
Size
2.7MB
-
MD5
24d9efd01b613eea96198d8ced69c61f
-
SHA1
7d8d20bf07a680e453f621c6268949dc709a7d0c
-
SHA256
ae2474abde94fad806a8f663eb8b904784cc73c240bbc9536cb81672c3a5b33a
-
SHA512
0c4ab8125b11c17feff7c57d93d2d231b55f4ab4f5b2593b9c58a8a42ba5046cb7fb5d8d2e98e5a4706df3ee95f52926efe4046a6cf43049a194c45904ef2e32
-
SSDEEP
49152:pFhq1QjQ3Mmc+Gs/LM6h4MmvJk5o8+00iWHm1s0apAQYYB:TOQjJoLXSvq5o8+07WG1Nak
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 180 24d9efd01b613eea96198d8ced69c61f.exe -
Executes dropped EXE 1 IoCs
pid Process 180 24d9efd01b613eea96198d8ced69c61f.exe -
resource yara_rule behavioral2/memory/1112-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x0007000000023202-12.dat upx behavioral2/memory/180-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1112 24d9efd01b613eea96198d8ced69c61f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1112 24d9efd01b613eea96198d8ced69c61f.exe 180 24d9efd01b613eea96198d8ced69c61f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1112 wrote to memory of 180 1112 24d9efd01b613eea96198d8ced69c61f.exe 22 PID 1112 wrote to memory of 180 1112 24d9efd01b613eea96198d8ced69c61f.exe 22 PID 1112 wrote to memory of 180 1112 24d9efd01b613eea96198d8ced69c61f.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\24d9efd01b613eea96198d8ced69c61f.exe"C:\Users\Admin\AppData\Local\Temp\24d9efd01b613eea96198d8ced69c61f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\24d9efd01b613eea96198d8ced69c61f.exeC:\Users\Admin\AppData\Local\Temp\24d9efd01b613eea96198d8ced69c61f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:180
-