Analysis
-
max time kernel
145s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:30
Behavioral task
behavioral1
Sample
38113b109322351ccd9eca93c8fd1359.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
38113b109322351ccd9eca93c8fd1359.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
38113b109322351ccd9eca93c8fd1359.exe
-
Size
1.5MB
-
MD5
38113b109322351ccd9eca93c8fd1359
-
SHA1
ac7bcfc32acd61aa60427392a808e91ef6fa5aa6
-
SHA256
01c769e9bbce53843a974338a171e148d1f2fcd63c306e70e235388b39b93610
-
SHA512
54f2dda5bdbf16b3cb9966d0478c84cb74682d3da4e0198c9f34a8296cd7732d14ccc90633f38ed3e9415a234a03a83423d71402a914ad8d7c437ea3a0f410d2
-
SSDEEP
24576:p46LpKzr/A7kII1KuSfks4i0rrBB3xCh4aHPHvvWz9cKskvW:bnwx1SMrBoHPHWmmv
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4772 38113b109322351ccd9eca93c8fd1359.exe -
Executes dropped EXE 1 IoCs
pid Process 4772 38113b109322351ccd9eca93c8fd1359.exe -
resource yara_rule behavioral2/memory/1412-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/4772-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1412 38113b109322351ccd9eca93c8fd1359.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1412 38113b109322351ccd9eca93c8fd1359.exe 4772 38113b109322351ccd9eca93c8fd1359.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1412 wrote to memory of 4772 1412 38113b109322351ccd9eca93c8fd1359.exe 21 PID 1412 wrote to memory of 4772 1412 38113b109322351ccd9eca93c8fd1359.exe 21 PID 1412 wrote to memory of 4772 1412 38113b109322351ccd9eca93c8fd1359.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\38113b109322351ccd9eca93c8fd1359.exe"C:\Users\Admin\AppData\Local\Temp\38113b109322351ccd9eca93c8fd1359.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\38113b109322351ccd9eca93c8fd1359.exeC:\Users\Admin\AppData\Local\Temp\38113b109322351ccd9eca93c8fd1359.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4772
-