Analysis
-
max time kernel
117s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 14:11
Behavioral task
behavioral1
Sample
395311df100f5e54f134e69e971df2cc.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
395311df100f5e54f134e69e971df2cc.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
395311df100f5e54f134e69e971df2cc.exe
-
Size
1.5MB
-
MD5
395311df100f5e54f134e69e971df2cc
-
SHA1
d9d5cb9e5579030439b879bced13ddd6efc94d62
-
SHA256
9fa086e864b1ae56d39c482c9b857d5890a767d9fea8084d85831fe3f0f8269f
-
SHA512
1f01618426e42b3564cc5a55ab610d917dd794959dcaa7583648346860523b170fabde620212c1da375810ca3e3c883045618dad295109eeb842bb39eced2770
-
SSDEEP
24576:BbYeMWoMMLvDEtL/l2jhduyeFa3eG9wv/QWIe7k6PlIY6VXDBW:CJM8otL/l2aY3t9wQW37k6rmXDB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3628 395311df100f5e54f134e69e971df2cc.exe -
Executes dropped EXE 1 IoCs
pid Process 3628 395311df100f5e54f134e69e971df2cc.exe -
resource yara_rule behavioral2/memory/2752-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2752 395311df100f5e54f134e69e971df2cc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2752 395311df100f5e54f134e69e971df2cc.exe 3628 395311df100f5e54f134e69e971df2cc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2752 wrote to memory of 3628 2752 395311df100f5e54f134e69e971df2cc.exe 15 PID 2752 wrote to memory of 3628 2752 395311df100f5e54f134e69e971df2cc.exe 15 PID 2752 wrote to memory of 3628 2752 395311df100f5e54f134e69e971df2cc.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\395311df100f5e54f134e69e971df2cc.exe"C:\Users\Admin\AppData\Local\Temp\395311df100f5e54f134e69e971df2cc.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\395311df100f5e54f134e69e971df2cc.exeC:\Users\Admin\AppData\Local\Temp\395311df100f5e54f134e69e971df2cc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3628
-