Analysis
-
max time kernel
143s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:17
Behavioral task
behavioral1
Sample
2615bba6335edb030be640bea53a6b39.exe
Resource
win7-20231129-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
2615bba6335edb030be640bea53a6b39.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
2615bba6335edb030be640bea53a6b39.exe
-
Size
5.3MB
-
MD5
2615bba6335edb030be640bea53a6b39
-
SHA1
62ba00a5de03bb71c4cc75c6dd8aadff810673e5
-
SHA256
eb66fda6bf4993e1d2d692f70814c9671f9bcbe8b1fd3a2a7df7561dbedfcf5f
-
SHA512
fe154459d3b721c7bedff10b8944fb55e65302c5ea055ce3eae093deea7195231d5646b20f6dd9ed7cdd05af8c71c7701d54c4263ea9849f1badd0ddb3aa67a9
-
SSDEEP
98304:04PXPp7ywoAev1LOSCGtymA/rnCEs/cKQjRzUo12wnzSCGtymA/rnCEsf:0K/dIAep0GtyB/rnCeKaRz+wnXGtyB/Y
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 468 2615bba6335edb030be640bea53a6b39.exe -
Executes dropped EXE 1 IoCs
pid Process 468 2615bba6335edb030be640bea53a6b39.exe -
resource yara_rule behavioral2/memory/2392-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/468-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2392 2615bba6335edb030be640bea53a6b39.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2392 2615bba6335edb030be640bea53a6b39.exe 468 2615bba6335edb030be640bea53a6b39.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2392 wrote to memory of 468 2392 2615bba6335edb030be640bea53a6b39.exe 28 PID 2392 wrote to memory of 468 2392 2615bba6335edb030be640bea53a6b39.exe 28 PID 2392 wrote to memory of 468 2392 2615bba6335edb030be640bea53a6b39.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2615bba6335edb030be640bea53a6b39.exe"C:\Users\Admin\AppData\Local\Temp\2615bba6335edb030be640bea53a6b39.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\2615bba6335edb030be640bea53a6b39.exeC:\Users\Admin\AppData\Local\Temp\2615bba6335edb030be640bea53a6b39.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:468
-