Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 04:04
Behavioral task
behavioral1
Sample
4a647f3d7a0c3c4eabdcef6b4bc5ea8c.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
4a647f3d7a0c3c4eabdcef6b4bc5ea8c.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
4a647f3d7a0c3c4eabdcef6b4bc5ea8c.exe
-
Size
2.7MB
-
MD5
4a647f3d7a0c3c4eabdcef6b4bc5ea8c
-
SHA1
edc04c7749d5dbbed0211c7df6491bed8e74297f
-
SHA256
40b34241ec16b6e6cfd8a265f72f73c54c08942ecbd0fd0e4b4f95cb8161bc4a
-
SHA512
b41d1ef58838afa4786dc18ffb7da2fe1fd5eb675abc88abadb815ac13f43a96a3e91a0a56049097267eabe013c7a582059a61651db01dad0306fcb7fea53dcb
-
SSDEEP
49152:FIhcL9K2kaTMdztCRypFg9ercoTe7WEvIN3ztG/H4/jnOYplIQLnBw:FICL9qaAdztCURcoTzeINhCgnO6V
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 548 4a647f3d7a0c3c4eabdcef6b4bc5ea8c.exe -
Executes dropped EXE 1 IoCs
pid Process 548 4a647f3d7a0c3c4eabdcef6b4bc5ea8c.exe -
resource yara_rule behavioral2/memory/4248-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/memory/548-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4248 4a647f3d7a0c3c4eabdcef6b4bc5ea8c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4248 4a647f3d7a0c3c4eabdcef6b4bc5ea8c.exe 548 4a647f3d7a0c3c4eabdcef6b4bc5ea8c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4248 wrote to memory of 548 4248 4a647f3d7a0c3c4eabdcef6b4bc5ea8c.exe 18 PID 4248 wrote to memory of 548 4248 4a647f3d7a0c3c4eabdcef6b4bc5ea8c.exe 18 PID 4248 wrote to memory of 548 4248 4a647f3d7a0c3c4eabdcef6b4bc5ea8c.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a647f3d7a0c3c4eabdcef6b4bc5ea8c.exe"C:\Users\Admin\AppData\Local\Temp\4a647f3d7a0c3c4eabdcef6b4bc5ea8c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\4a647f3d7a0c3c4eabdcef6b4bc5ea8c.exeC:\Users\Admin\AppData\Local\Temp\4a647f3d7a0c3c4eabdcef6b4bc5ea8c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:548
-