Analysis
-
max time kernel
2s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:32
Behavioral task
behavioral1
Sample
2848ac7af1572e7199e3ae19b0da472b.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
2848ac7af1572e7199e3ae19b0da472b.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
2848ac7af1572e7199e3ae19b0da472b.exe
-
Size
10.2MB
-
MD5
2848ac7af1572e7199e3ae19b0da472b
-
SHA1
164d2ce479baa8d172340a1675fb1c0a8998ed44
-
SHA256
c33c829e78096b62292b79f4d618d7c00a51e262cb9caab3f0c2f1f0b8893baf
-
SHA512
dc08f6c6469af5c303b8978ffe739f19d98e8585326eaa190c196be3aa45d3cf1d13500481cf7e185af019ccdcb7329c8c81ac95f375f3a16c4cd3ca6d69be1b
-
SSDEEP
98304:1g3B2dtrJUxahTW+30g2yOEjjs9/g3b9isURGKFDnaM2Fe430g2yOEjjs9/g3:1gOJJUx0uZUju/cFiZDF26ZUju/
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3868 2848ac7af1572e7199e3ae19b0da472b.exe -
Executes dropped EXE 1 IoCs
pid Process 3868 2848ac7af1572e7199e3ae19b0da472b.exe -
resource yara_rule behavioral2/memory/3868-14-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral2/memory/3472-0-0x0000000000400000-0x0000000000D9E000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3472 2848ac7af1572e7199e3ae19b0da472b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3472 2848ac7af1572e7199e3ae19b0da472b.exe 3868 2848ac7af1572e7199e3ae19b0da472b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3472 wrote to memory of 3868 3472 2848ac7af1572e7199e3ae19b0da472b.exe 22 PID 3472 wrote to memory of 3868 3472 2848ac7af1572e7199e3ae19b0da472b.exe 22 PID 3472 wrote to memory of 3868 3472 2848ac7af1572e7199e3ae19b0da472b.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\2848ac7af1572e7199e3ae19b0da472b.exe"C:\Users\Admin\AppData\Local\Temp\2848ac7af1572e7199e3ae19b0da472b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\2848ac7af1572e7199e3ae19b0da472b.exeC:\Users\Admin\AppData\Local\Temp\2848ac7af1572e7199e3ae19b0da472b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3868
-