Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2024 09:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
488ed4e890d1555be6de63ff98c155f0.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
488ed4e890d1555be6de63ff98c155f0.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
488ed4e890d1555be6de63ff98c155f0.exe
-
Size
385KB
-
MD5
488ed4e890d1555be6de63ff98c155f0
-
SHA1
48e26a5345ab305552ff6e9aeb067cc1a6ed691f
-
SHA256
c27b4a6f45c07d8a61d3369afa940c1435659b0e971db0b790ff61156ff80669
-
SHA512
08fa408ceb6cd1178ad712ff5c1731933e6636db85d9b571043a30ad3e97c07ac451a5a7908585b946996b1f57b0a8d9386566d060a39f963013eeb435531b19
-
SSDEEP
12288:kiVmSt5J/wzRCD7VQNbSGnWc18dkUdr83B:kGh5J/wsqn11UdrOB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2028 488ed4e890d1555be6de63ff98c155f0.exe -
Executes dropped EXE 1 IoCs
pid Process 2028 488ed4e890d1555be6de63ff98c155f0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3228 488ed4e890d1555be6de63ff98c155f0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3228 488ed4e890d1555be6de63ff98c155f0.exe 2028 488ed4e890d1555be6de63ff98c155f0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3228 wrote to memory of 2028 3228 488ed4e890d1555be6de63ff98c155f0.exe 18 PID 3228 wrote to memory of 2028 3228 488ed4e890d1555be6de63ff98c155f0.exe 18 PID 3228 wrote to memory of 2028 3228 488ed4e890d1555be6de63ff98c155f0.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\488ed4e890d1555be6de63ff98c155f0.exe"C:\Users\Admin\AppData\Local\Temp\488ed4e890d1555be6de63ff98c155f0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\488ed4e890d1555be6de63ff98c155f0.exeC:\Users\Admin\AppData\Local\Temp\488ed4e890d1555be6de63ff98c155f0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2028
-