Analysis
-
max time kernel
2s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:53
Behavioral task
behavioral1
Sample
28f2ec2a7e8ccc1e0429227499c15644.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
28f2ec2a7e8ccc1e0429227499c15644.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
28f2ec2a7e8ccc1e0429227499c15644.exe
-
Size
5.1MB
-
MD5
28f2ec2a7e8ccc1e0429227499c15644
-
SHA1
99e183d6efb0232b13d1cead9ac44cc25a220c0d
-
SHA256
05ade7c9ec417adddc7adad841880661a88dc63ba6efa464f9b4453329bb9bb8
-
SHA512
deac1793b02b0f80fd08710b497d405763e28f78f4a9786ae7aab927cf8836625f405e3051c08cad6daf79aa0ebbe048e056c57de5317ef8c706c4fed5480515
-
SSDEEP
49152:Q6nZ1EAF1uIXFa7/rkGFXYifz7R2ySQZHttMay3rClb/nvTZG5uRqh0gI3QxNm/N:nnbaYw6ySsE3rClznvOuScAfIqm3
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5092 28f2ec2a7e8ccc1e0429227499c15644.exe -
Executes dropped EXE 1 IoCs
pid Process 5092 28f2ec2a7e8ccc1e0429227499c15644.exe -
resource yara_rule behavioral2/memory/5092-15-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral2/memory/3244-0-0x0000000000400000-0x0000000000D9E000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3244 28f2ec2a7e8ccc1e0429227499c15644.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3244 28f2ec2a7e8ccc1e0429227499c15644.exe 5092 28f2ec2a7e8ccc1e0429227499c15644.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3244 wrote to memory of 5092 3244 28f2ec2a7e8ccc1e0429227499c15644.exe 21 PID 3244 wrote to memory of 5092 3244 28f2ec2a7e8ccc1e0429227499c15644.exe 21 PID 3244 wrote to memory of 5092 3244 28f2ec2a7e8ccc1e0429227499c15644.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\28f2ec2a7e8ccc1e0429227499c15644.exe"C:\Users\Admin\AppData\Local\Temp\28f2ec2a7e8ccc1e0429227499c15644.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\28f2ec2a7e8ccc1e0429227499c15644.exeC:\Users\Admin\AppData\Local\Temp\28f2ec2a7e8ccc1e0429227499c15644.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5092
-