Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 19:31
Behavioral task
behavioral1
Sample
3ee2fb837141f7fb4f0077009b2f04cb.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
3ee2fb837141f7fb4f0077009b2f04cb.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
3ee2fb837141f7fb4f0077009b2f04cb.exe
-
Size
10.6MB
-
MD5
3ee2fb837141f7fb4f0077009b2f04cb
-
SHA1
89d0cdaf14d451e638a4576e140a5902b4b19585
-
SHA256
d555ad5abaaf2831b164b1d0283fa2a3cff6c5cfb9c4ab771f8cb24ac6e79a55
-
SHA512
87f86fed2a09f7d92657c536a1ae6490a49b98069da30a1d9f15faa92d1f786c8e1133001119a8ff2e0a0eba3466b6f4180d89302713859be6aebe27cd530111
-
SSDEEP
196608:lmxs2AschDHIxlWXSyRloWYOschDHIDnPkxlLktIjGRschDHIxlWXSyRloWYOscY:lmy20DHElOSZSDH4nPkxRGNDHElOSZSa
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3808 3ee2fb837141f7fb4f0077009b2f04cb.exe -
Executes dropped EXE 1 IoCs
pid Process 3808 3ee2fb837141f7fb4f0077009b2f04cb.exe -
resource yara_rule behavioral2/memory/1216-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/memory/3808-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1216 3ee2fb837141f7fb4f0077009b2f04cb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1216 3ee2fb837141f7fb4f0077009b2f04cb.exe 3808 3ee2fb837141f7fb4f0077009b2f04cb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1216 wrote to memory of 3808 1216 3ee2fb837141f7fb4f0077009b2f04cb.exe 46 PID 1216 wrote to memory of 3808 1216 3ee2fb837141f7fb4f0077009b2f04cb.exe 46 PID 1216 wrote to memory of 3808 1216 3ee2fb837141f7fb4f0077009b2f04cb.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ee2fb837141f7fb4f0077009b2f04cb.exe"C:\Users\Admin\AppData\Local\Temp\3ee2fb837141f7fb4f0077009b2f04cb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\3ee2fb837141f7fb4f0077009b2f04cb.exeC:\Users\Admin\AppData\Local\Temp\3ee2fb837141f7fb4f0077009b2f04cb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3808
-