Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:10
Behavioral task
behavioral1
Sample
2402e11e713a49367728625f374dac9f.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2402e11e713a49367728625f374dac9f.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
2402e11e713a49367728625f374dac9f.exe
-
Size
5.8MB
-
MD5
2402e11e713a49367728625f374dac9f
-
SHA1
deabc564580bd54a941ae9493f14d19dfb5f7b9c
-
SHA256
e5f86a7c25f225d9f4f2c02bf0d4f6c2ac24db9e05e2857fa0823566c9e9e033
-
SHA512
344e67d1438842bca3d05b08ec2fd17b8180fd2996d6cd7abe585bc512d8e8d5d2d48ee67d2b832c71914c68219297ef2dc722403bb7a672ebbd64c69ff1e092
-
SSDEEP
98304:A7jTWM4L3gg3gnl/IVUs1jePsJHgjnzn70IlNo5Q5ygg3gnl/IVUs1jePs:eTfegl/iBiPwElNGQIgl/iBiP
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2480 2402e11e713a49367728625f374dac9f.exe -
Executes dropped EXE 1 IoCs
pid Process 2480 2402e11e713a49367728625f374dac9f.exe -
resource yara_rule behavioral2/memory/2896-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2896 2402e11e713a49367728625f374dac9f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2896 2402e11e713a49367728625f374dac9f.exe 2480 2402e11e713a49367728625f374dac9f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2480 2896 2402e11e713a49367728625f374dac9f.exe 18 PID 2896 wrote to memory of 2480 2896 2402e11e713a49367728625f374dac9f.exe 18 PID 2896 wrote to memory of 2480 2896 2402e11e713a49367728625f374dac9f.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\2402e11e713a49367728625f374dac9f.exe"C:\Users\Admin\AppData\Local\Temp\2402e11e713a49367728625f374dac9f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\2402e11e713a49367728625f374dac9f.exeC:\Users\Admin\AppData\Local\Temp\2402e11e713a49367728625f374dac9f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2480
-