Analysis
-
max time kernel
143s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 14:16
Behavioral task
behavioral1
Sample
4670d6b9b0f0412c21abe07ea724392f.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
4670d6b9b0f0412c21abe07ea724392f.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
4670d6b9b0f0412c21abe07ea724392f.exe
-
Size
1.5MB
-
MD5
4670d6b9b0f0412c21abe07ea724392f
-
SHA1
d30ba2312370ce1f55ec9852f056cb97db3601bc
-
SHA256
b97153fd89467715cb47ea6c9b396a60e96ce7d55ab55ce67a8b32bb8f8c9ce5
-
SHA512
f60f27dc791a816ce6bad3860e2b3ed2e71c72457c5b5cd8874aecde2307183dfbee5b66ba0cbefc4981d61cda90c2a5bcfe29df4868221d420ee777dc0e6425
-
SSDEEP
24576:mJDj7qZhCJWyBZQZogNYY/JNkmwVb2tiM+Rz9cyPTjJW:mJDYyjuoK/kj8iZ59cCx
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 532 4670d6b9b0f0412c21abe07ea724392f.exe -
Executes dropped EXE 1 IoCs
pid Process 532 4670d6b9b0f0412c21abe07ea724392f.exe -
resource yara_rule behavioral2/memory/4648-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4648 4670d6b9b0f0412c21abe07ea724392f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4648 4670d6b9b0f0412c21abe07ea724392f.exe 532 4670d6b9b0f0412c21abe07ea724392f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4648 wrote to memory of 532 4648 4670d6b9b0f0412c21abe07ea724392f.exe 88 PID 4648 wrote to memory of 532 4648 4670d6b9b0f0412c21abe07ea724392f.exe 88 PID 4648 wrote to memory of 532 4648 4670d6b9b0f0412c21abe07ea724392f.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4670d6b9b0f0412c21abe07ea724392f.exe"C:\Users\Admin\AppData\Local\Temp\4670d6b9b0f0412c21abe07ea724392f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\4670d6b9b0f0412c21abe07ea724392f.exeC:\Users\Admin\AppData\Local\Temp\4670d6b9b0f0412c21abe07ea724392f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:532
-