Analysis
-
max time kernel
2s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 18:16
Behavioral task
behavioral1
Sample
3d89c4c1ccbe48db8c123160314bfe76.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
3d89c4c1ccbe48db8c123160314bfe76.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
3d89c4c1ccbe48db8c123160314bfe76.exe
-
Size
133KB
-
MD5
3d89c4c1ccbe48db8c123160314bfe76
-
SHA1
8ba032abd2b328bfb9f3777bc33730128a01d981
-
SHA256
aae161bbb095224f0637263cfe379d7096340c9a17bde3f51920acfd59ad8278
-
SHA512
0e1e81a391ca6d508db156125eded30344463f65810a27ff69f06f03e13b2f7ae602944729a2b69338b149bd47c17879009c23994af9580a2f17f5d53b9db607
-
SSDEEP
3072:iPrhNXh+NKUDtjIX0tpbrUO3ZgEKg3IlUEY3RQ:eSIEt1vLYlUVRQ
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5084 3d89c4c1ccbe48db8c123160314bfe76.exe -
Executes dropped EXE 1 IoCs
pid Process 5084 3d89c4c1ccbe48db8c123160314bfe76.exe -
resource yara_rule behavioral2/memory/2324-0-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/memory/5084-14-0x0000000000400000-0x0000000000486000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2324 3d89c4c1ccbe48db8c123160314bfe76.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2324 3d89c4c1ccbe48db8c123160314bfe76.exe 5084 3d89c4c1ccbe48db8c123160314bfe76.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2324 wrote to memory of 5084 2324 3d89c4c1ccbe48db8c123160314bfe76.exe 20 PID 2324 wrote to memory of 5084 2324 3d89c4c1ccbe48db8c123160314bfe76.exe 20 PID 2324 wrote to memory of 5084 2324 3d89c4c1ccbe48db8c123160314bfe76.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d89c4c1ccbe48db8c123160314bfe76.exe"C:\Users\Admin\AppData\Local\Temp\3d89c4c1ccbe48db8c123160314bfe76.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\3d89c4c1ccbe48db8c123160314bfe76.exeC:\Users\Admin\AppData\Local\Temp\3d89c4c1ccbe48db8c123160314bfe76.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5084
-