Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 06:11
Behavioral task
behavioral1
Sample
4fcbb9b1502ea383dd4f28f4bd11939e.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
4fcbb9b1502ea383dd4f28f4bd11939e.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
4fcbb9b1502ea383dd4f28f4bd11939e.exe
-
Size
1.3MB
-
MD5
4fcbb9b1502ea383dd4f28f4bd11939e
-
SHA1
19bcdb6fde89e393b6f0350c85b0ab6316062ed4
-
SHA256
ea58d8ae80899d82dbc43dde79954deaa7dfdaefd24457827c4968c47df24f59
-
SHA512
ffd8723b1a362aacc7f36d788800596a4f0573f8476aa531db129b8ec6e20f5c8e7770fe8fb5b7f919c9822307c179d20bb5e001470aa8456668503c83f0288f
-
SSDEEP
12288:xHJF06Fx9TrvDV0xxJAQAC/ecovvJTXarGI/Xd0kK6cEqH05DRBnOivE1lkVunjs:t06tPvB6/VAJbqN66c+9Bni1laMj9vG
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2572 4fcbb9b1502ea383dd4f28f4bd11939e.exe -
Executes dropped EXE 1 IoCs
pid Process 2572 4fcbb9b1502ea383dd4f28f4bd11939e.exe -
resource yara_rule behavioral2/memory/4948-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/memory/2572-15-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4948 4fcbb9b1502ea383dd4f28f4bd11939e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4948 4fcbb9b1502ea383dd4f28f4bd11939e.exe 2572 4fcbb9b1502ea383dd4f28f4bd11939e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4948 wrote to memory of 2572 4948 4fcbb9b1502ea383dd4f28f4bd11939e.exe 16 PID 4948 wrote to memory of 2572 4948 4fcbb9b1502ea383dd4f28f4bd11939e.exe 16 PID 4948 wrote to memory of 2572 4948 4fcbb9b1502ea383dd4f28f4bd11939e.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fcbb9b1502ea383dd4f28f4bd11939e.exe"C:\Users\Admin\AppData\Local\Temp\4fcbb9b1502ea383dd4f28f4bd11939e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\4fcbb9b1502ea383dd4f28f4bd11939e.exeC:\Users\Admin\AppData\Local\Temp\4fcbb9b1502ea383dd4f28f4bd11939e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2572
-