Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 23:25
Behavioral task
behavioral1
Sample
4230079f94d149c1dabe86b71a004404.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
4230079f94d149c1dabe86b71a004404.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
4230079f94d149c1dabe86b71a004404.exe
-
Size
5.3MB
-
MD5
4230079f94d149c1dabe86b71a004404
-
SHA1
1541d1c16875b02a6eb4486ba1e713bcdb4d5f9f
-
SHA256
5d9539c98174ef2e6e589f0f71ab45d9c0790fc2e40adb1f33f465d09314783c
-
SHA512
e1515db8224b7cc78d3fa4960e14bca2c0bb70c5a6f502e0dd21b559136b44a168cdf431e4ec091687b0c72bddf3bd46a845fd823004d9d8471344ba8bbd112e
-
SSDEEP
98304:0LSj3exr0r7mLIIt1GhrPM/P+RHWIJym8c0y+nx9OVNLIIt1GhrPM/P+RHWIp:0LSje1/rXGhLM/PvZXbGRrXGhLM/Pi
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2256 4230079f94d149c1dabe86b71a004404.exe -
Executes dropped EXE 1 IoCs
pid Process 2256 4230079f94d149c1dabe86b71a004404.exe -
resource yara_rule behavioral2/memory/5028-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/2256-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5028 4230079f94d149c1dabe86b71a004404.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5028 4230079f94d149c1dabe86b71a004404.exe 2256 4230079f94d149c1dabe86b71a004404.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5028 wrote to memory of 2256 5028 4230079f94d149c1dabe86b71a004404.exe 22 PID 5028 wrote to memory of 2256 5028 4230079f94d149c1dabe86b71a004404.exe 22 PID 5028 wrote to memory of 2256 5028 4230079f94d149c1dabe86b71a004404.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\4230079f94d149c1dabe86b71a004404.exe"C:\Users\Admin\AppData\Local\Temp\4230079f94d149c1dabe86b71a004404.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\4230079f94d149c1dabe86b71a004404.exeC:\Users\Admin\AppData\Local\Temp\4230079f94d149c1dabe86b71a004404.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2256
-