Analysis
-
max time kernel
118s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 04:53
Behavioral task
behavioral1
Sample
28f6fe9a116d3fb9f7a580e41c6d7ffd.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
28f6fe9a116d3fb9f7a580e41c6d7ffd.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
28f6fe9a116d3fb9f7a580e41c6d7ffd.exe
-
Size
2.7MB
-
MD5
28f6fe9a116d3fb9f7a580e41c6d7ffd
-
SHA1
93ed0f162631a07a466e41200f4ea86c28f27754
-
SHA256
ef3757719e66196009f935b90bbddd6c4b5169f03e6b3eeaedfbd95bd8954ce8
-
SHA512
ee31275bd49d2535b9f17dca7c797ba708077c29843b6f3e931830df225f4368252c021ac6ca275d0f71f88364bc9d0a3a849e34770037e56dc7748ba050cc01
-
SSDEEP
49152:uVBxq+tvvH0GT3dI+kL9xcIanMOR9TCXPF41HUVSUXp18Q8ZyGdCCC7mtqYSWcRt:+Bx7tvvvT3S+kLPcIxOHO/u10EUQTZtS
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2088 28f6fe9a116d3fb9f7a580e41c6d7ffd.exe -
Executes dropped EXE 1 IoCs
pid Process 2088 28f6fe9a116d3fb9f7a580e41c6d7ffd.exe -
resource yara_rule behavioral2/memory/3948-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3948 28f6fe9a116d3fb9f7a580e41c6d7ffd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3948 28f6fe9a116d3fb9f7a580e41c6d7ffd.exe 2088 28f6fe9a116d3fb9f7a580e41c6d7ffd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3948 wrote to memory of 2088 3948 28f6fe9a116d3fb9f7a580e41c6d7ffd.exe 18 PID 3948 wrote to memory of 2088 3948 28f6fe9a116d3fb9f7a580e41c6d7ffd.exe 18 PID 3948 wrote to memory of 2088 3948 28f6fe9a116d3fb9f7a580e41c6d7ffd.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\28f6fe9a116d3fb9f7a580e41c6d7ffd.exe"C:\Users\Admin\AppData\Local\Temp\28f6fe9a116d3fb9f7a580e41c6d7ffd.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\28f6fe9a116d3fb9f7a580e41c6d7ffd.exeC:\Users\Admin\AppData\Local\Temp\28f6fe9a116d3fb9f7a580e41c6d7ffd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2088
-