Analysis
-
max time kernel
145s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:52
Behavioral task
behavioral1
Sample
270172fbe1f788b47812ef8e764d3f1a.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
270172fbe1f788b47812ef8e764d3f1a.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
270172fbe1f788b47812ef8e764d3f1a.exe
-
Size
2.9MB
-
MD5
270172fbe1f788b47812ef8e764d3f1a
-
SHA1
6a3ed775b3f321f2e5ceccc8e0f00ea92cd438bf
-
SHA256
d8c59613dbb60e2eaf8f87c1533c35d3d2e01ea9a0b690c68db87c8212bac65a
-
SHA512
d28a792cbdf08f5344031e510b3fedb0307b73a8131f1c6a592649cfed37e25b594d4d0135e9da89a1611a4ff28ad870bdf379223a45495c277844e3e08c63ef
-
SSDEEP
49152:ECEah3AcyAYqY1XujqPHW4eC7jdsP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:ECJ2lMjqf6eCgg3gnl/IVUs1jePs
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 464 270172fbe1f788b47812ef8e764d3f1a.exe -
Executes dropped EXE 1 IoCs
pid Process 464 270172fbe1f788b47812ef8e764d3f1a.exe -
resource yara_rule behavioral2/memory/792-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/464-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 792 270172fbe1f788b47812ef8e764d3f1a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 792 270172fbe1f788b47812ef8e764d3f1a.exe 464 270172fbe1f788b47812ef8e764d3f1a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 792 wrote to memory of 464 792 270172fbe1f788b47812ef8e764d3f1a.exe 20 PID 792 wrote to memory of 464 792 270172fbe1f788b47812ef8e764d3f1a.exe 20 PID 792 wrote to memory of 464 792 270172fbe1f788b47812ef8e764d3f1a.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\270172fbe1f788b47812ef8e764d3f1a.exe"C:\Users\Admin\AppData\Local\Temp\270172fbe1f788b47812ef8e764d3f1a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\270172fbe1f788b47812ef8e764d3f1a.exeC:\Users\Admin\AppData\Local\Temp\270172fbe1f788b47812ef8e764d3f1a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:464
-