Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 01:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4f39b8bc3c5983e78f85aface3416e57.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
4f39b8bc3c5983e78f85aface3416e57.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
4f39b8bc3c5983e78f85aface3416e57.exe
-
Size
82KB
-
MD5
4f39b8bc3c5983e78f85aface3416e57
-
SHA1
fb5fb584ddeb9c201f5ae283ee3d07bf98d25bd9
-
SHA256
ca085526d394b6bf014396e613a55d463b1a6a8197b510b6ba69ea9d34df7cfb
-
SHA512
952a9d924c2186f2de402d55d66dd7a4fb077bcd2ddd43e1f0cc4201883b4b5c1bc998c5bf32b4445d3f2b70b51f3939ac3a93c1252aa7d301b8343cabc28ed9
-
SSDEEP
1536:MhwUL2keS6tzKcPBLQZ50lIZ/4JSbeHGlKCXdBeLU6v+FU2fWPzR54MHP7H18Wx+:qwUL2keS6llPBLLlIZ/4MeHGbuoVF/uk
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5104 4f39b8bc3c5983e78f85aface3416e57.exe -
Executes dropped EXE 1 IoCs
pid Process 5104 4f39b8bc3c5983e78f85aface3416e57.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1712 4f39b8bc3c5983e78f85aface3416e57.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1712 4f39b8bc3c5983e78f85aface3416e57.exe 5104 4f39b8bc3c5983e78f85aface3416e57.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1712 wrote to memory of 5104 1712 4f39b8bc3c5983e78f85aface3416e57.exe 21 PID 1712 wrote to memory of 5104 1712 4f39b8bc3c5983e78f85aface3416e57.exe 21 PID 1712 wrote to memory of 5104 1712 4f39b8bc3c5983e78f85aface3416e57.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f39b8bc3c5983e78f85aface3416e57.exe"C:\Users\Admin\AppData\Local\Temp\4f39b8bc3c5983e78f85aface3416e57.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\4f39b8bc3c5983e78f85aface3416e57.exeC:\Users\Admin\AppData\Local\Temp\4f39b8bc3c5983e78f85aface3416e57.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5104
-