Analysis
-
max time kernel
173s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 03:28
Behavioral task
behavioral1
Sample
26631b257344e32937a0242d485b94aa.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
26631b257344e32937a0242d485b94aa.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
26631b257344e32937a0242d485b94aa.exe
-
Size
5.8MB
-
MD5
26631b257344e32937a0242d485b94aa
-
SHA1
2a489d1ead79877344c1b0bb81e2b85eccb73a01
-
SHA256
59ac90a6dc080a804c53811710a5aad558a14ea4156ef6ba08e23d6c239b68b5
-
SHA512
60bc70538d3b28f9e72938826a343a35e0555bc7fd5ec0e98849f67b252222ebec7a1be47fc47471648f8f9b013456f888b577ca014fbf967f15add5ff2e6dde
-
SSDEEP
98304:zHXLQiEUXaeHau42c1joCjMPkNwk6alDAqD7z3uboHau42c1joCjMPkNwk6:z38ijXPauq1jI86FA7y2auq1jI86
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3992 26631b257344e32937a0242d485b94aa.exe -
Executes dropped EXE 1 IoCs
pid Process 3992 26631b257344e32937a0242d485b94aa.exe -
resource yara_rule behavioral2/memory/5008-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/3992-12-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5008 26631b257344e32937a0242d485b94aa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5008 26631b257344e32937a0242d485b94aa.exe 3992 26631b257344e32937a0242d485b94aa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5008 wrote to memory of 3992 5008 26631b257344e32937a0242d485b94aa.exe 50 PID 5008 wrote to memory of 3992 5008 26631b257344e32937a0242d485b94aa.exe 50 PID 5008 wrote to memory of 3992 5008 26631b257344e32937a0242d485b94aa.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\26631b257344e32937a0242d485b94aa.exe"C:\Users\Admin\AppData\Local\Temp\26631b257344e32937a0242d485b94aa.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\26631b257344e32937a0242d485b94aa.exeC:\Users\Admin\AppData\Local\Temp\26631b257344e32937a0242d485b94aa.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3992
-