Analysis
-
max time kernel
1s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 03:06
Behavioral task
behavioral1
Sample
4f698ffca26a6f09cd1e1801b7936082.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
4f698ffca26a6f09cd1e1801b7936082.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
4f698ffca26a6f09cd1e1801b7936082.exe
-
Size
10.2MB
-
MD5
4f698ffca26a6f09cd1e1801b7936082
-
SHA1
ad02d1d563f34d0889fb83a21ddca4f3f3797a7e
-
SHA256
2830f2262918b7156fe75c258f93ce47f62337d6ad7e47024c28611ee5188d19
-
SHA512
99084776ad4e131dddb3f8a18259e8bb8b5bf15c7934d19bede52a8171ab1848b5ae079f36be4dd04a5a6484d1d306f1932a8d0310edc5b3c8ffabb262353ae0
-
SSDEEP
98304:CsCtw4hgLf3k6S3KdLIBKi3X3eo78wrJVmAgKtkKq3KdLIBKi3X3:CBe4WLs0N+KmeoIGkoN+Km
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4820 4f698ffca26a6f09cd1e1801b7936082.exe -
Executes dropped EXE 1 IoCs
pid Process 4820 4f698ffca26a6f09cd1e1801b7936082.exe -
resource yara_rule behavioral2/memory/3568-0-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral2/memory/4820-15-0x0000000000400000-0x0000000000D9E000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3568 4f698ffca26a6f09cd1e1801b7936082.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3568 4f698ffca26a6f09cd1e1801b7936082.exe 4820 4f698ffca26a6f09cd1e1801b7936082.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3568 wrote to memory of 4820 3568 4f698ffca26a6f09cd1e1801b7936082.exe 20 PID 3568 wrote to memory of 4820 3568 4f698ffca26a6f09cd1e1801b7936082.exe 20 PID 3568 wrote to memory of 4820 3568 4f698ffca26a6f09cd1e1801b7936082.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f698ffca26a6f09cd1e1801b7936082.exe"C:\Users\Admin\AppData\Local\Temp\4f698ffca26a6f09cd1e1801b7936082.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\4f698ffca26a6f09cd1e1801b7936082.exeC:\Users\Admin\AppData\Local\Temp\4f698ffca26a6f09cd1e1801b7936082.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4820
-