Analysis
-
max time kernel
145s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
386a832ff4ab10a63bb2ca481657d6e4.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
386a832ff4ab10a63bb2ca481657d6e4.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
386a832ff4ab10a63bb2ca481657d6e4.exe
-
Size
385KB
-
MD5
386a832ff4ab10a63bb2ca481657d6e4
-
SHA1
2fc2d0a72cf4f8dc9cd5e488035f28ad094ede6e
-
SHA256
cd6964a1234a6aae1e643145d1397dc7bc503b65668f0678e95d8d612789afb1
-
SHA512
3d0d13bbe81b8a1400fcd0fd19c6e3c01cd4dd907efcf5c27962baa657579ed22921ce3bb40d8f9294a1c5e4ceab8a2363202832dd6676b4c2a2971720317a69
-
SSDEEP
6144:LgNwzExeE7fFTPs2pSfstQtNUKucyvs/xjHlK3k7Gu+IVQ5fKARdB:8IodNkf8QtNU9cDI3mD+bdB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2208 386a832ff4ab10a63bb2ca481657d6e4.exe -
Executes dropped EXE 1 IoCs
pid Process 2208 386a832ff4ab10a63bb2ca481657d6e4.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4960 386a832ff4ab10a63bb2ca481657d6e4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4960 386a832ff4ab10a63bb2ca481657d6e4.exe 2208 386a832ff4ab10a63bb2ca481657d6e4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4960 wrote to memory of 2208 4960 386a832ff4ab10a63bb2ca481657d6e4.exe 20 PID 4960 wrote to memory of 2208 4960 386a832ff4ab10a63bb2ca481657d6e4.exe 20 PID 4960 wrote to memory of 2208 4960 386a832ff4ab10a63bb2ca481657d6e4.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\386a832ff4ab10a63bb2ca481657d6e4.exe"C:\Users\Admin\AppData\Local\Temp\386a832ff4ab10a63bb2ca481657d6e4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\386a832ff4ab10a63bb2ca481657d6e4.exeC:\Users\Admin\AppData\Local\Temp\386a832ff4ab10a63bb2ca481657d6e4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2208
-