Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 14:01
Behavioral task
behavioral1
Sample
4ba1e0cafd6796819159b985d33e2f7c.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
4ba1e0cafd6796819159b985d33e2f7c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
4ba1e0cafd6796819159b985d33e2f7c.exe
-
Size
5.8MB
-
MD5
4ba1e0cafd6796819159b985d33e2f7c
-
SHA1
3a1e6f6ab9bea565a67ed85652c65f35df62405d
-
SHA256
883ecdd5fd15ac33223b0b869e89303d38ee4c6b2f79e44f8c467f8ea6767a76
-
SHA512
8572e5b770566741511ccd8744b5e076bc998aea11e5e6498f64b163041e8351cb6996e2769d8998162b2d66eb8f2cb568b4fa6902aa4c0f64393b1c04e920e3
-
SSDEEP
98304:dpl9t0Y0d6fEEg1mgg3gnl/IVUs1jePsxLTCEXIDSdVfHPJ7zh0ygg3gnl/IVUsn:dz9tvZxg8gl/iBiPeTCEXamxHP70Wgll
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1448 4ba1e0cafd6796819159b985d33e2f7c.exe -
Executes dropped EXE 1 IoCs
pid Process 1448 4ba1e0cafd6796819159b985d33e2f7c.exe -
resource yara_rule behavioral2/memory/1448-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/1712-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1712 4ba1e0cafd6796819159b985d33e2f7c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1712 4ba1e0cafd6796819159b985d33e2f7c.exe 1448 4ba1e0cafd6796819159b985d33e2f7c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1448 1712 4ba1e0cafd6796819159b985d33e2f7c.exe 20 PID 1712 wrote to memory of 1448 1712 4ba1e0cafd6796819159b985d33e2f7c.exe 20 PID 1712 wrote to memory of 1448 1712 4ba1e0cafd6796819159b985d33e2f7c.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ba1e0cafd6796819159b985d33e2f7c.exe"C:\Users\Admin\AppData\Local\Temp\4ba1e0cafd6796819159b985d33e2f7c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\4ba1e0cafd6796819159b985d33e2f7c.exeC:\Users\Admin\AppData\Local\Temp\4ba1e0cafd6796819159b985d33e2f7c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1448
-