Analysis
-
max time kernel
145s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 13:51
Behavioral task
behavioral1
Sample
38b9464cf2285a3e0035762599bb333f.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
38b9464cf2285a3e0035762599bb333f.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
38b9464cf2285a3e0035762599bb333f.exe
-
Size
5.3MB
-
MD5
38b9464cf2285a3e0035762599bb333f
-
SHA1
3aeda74cb41d4821e7f0940d619b36dad0e84218
-
SHA256
9a65bc8182c01a8726fe3b6ec39243880a1aa3c75f641b24b6bce785f2d392f9
-
SHA512
9f2813d925164a4603873454e6582aa9546f5a3cee0912c829cd2a78526081aa8f3fcf03a718438f9e8412bcbe0cb5491c4ee8e1c18287499622bf18f091b09f
-
SSDEEP
98304:CPti9X06r/i1HCQCFqagNBBTt5+mzrbjzHiZmoiC8m3vaB1HCQCFqagNBBTt5+mn:C1sE6aiQ0qakBR/zrbjz3N1qa1iQ0qaI
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1124 38b9464cf2285a3e0035762599bb333f.exe -
Executes dropped EXE 1 IoCs
pid Process 1124 38b9464cf2285a3e0035762599bb333f.exe -
resource yara_rule behavioral2/memory/4280-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4280 38b9464cf2285a3e0035762599bb333f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4280 38b9464cf2285a3e0035762599bb333f.exe 1124 38b9464cf2285a3e0035762599bb333f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4280 wrote to memory of 1124 4280 38b9464cf2285a3e0035762599bb333f.exe 20 PID 4280 wrote to memory of 1124 4280 38b9464cf2285a3e0035762599bb333f.exe 20 PID 4280 wrote to memory of 1124 4280 38b9464cf2285a3e0035762599bb333f.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\38b9464cf2285a3e0035762599bb333f.exe"C:\Users\Admin\AppData\Local\Temp\38b9464cf2285a3e0035762599bb333f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\38b9464cf2285a3e0035762599bb333f.exeC:\Users\Admin\AppData\Local\Temp\38b9464cf2285a3e0035762599bb333f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1124
-