Analysis
-
max time kernel
147s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 06:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4fd82337068562ee1a05c698a7a95f4a.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
4fd82337068562ee1a05c698a7a95f4a.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
4fd82337068562ee1a05c698a7a95f4a.exe
-
Size
385KB
-
MD5
4fd82337068562ee1a05c698a7a95f4a
-
SHA1
c00990d02e2619388c1787e0d04892b01a910b24
-
SHA256
2127978cafd1dc5264a82b363aca75a2c74ae0449c2d95d8060b0fbd85411ebc
-
SHA512
5a87f6fc275131adb8183db5477c450bd866b3c00865251d001388bc280a0709bcaab94775ada6c72ee7db609b8dcd5b78d5524ed37626163c839eda569c48ae
-
SSDEEP
12288:bdW5Rofs8YG+od9rpRxqqP39X7rKC8e5B:bAtovpy8Fec5B
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4336 4fd82337068562ee1a05c698a7a95f4a.exe -
Executes dropped EXE 1 IoCs
pid Process 4336 4fd82337068562ee1a05c698a7a95f4a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4876 4fd82337068562ee1a05c698a7a95f4a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4876 4fd82337068562ee1a05c698a7a95f4a.exe 4336 4fd82337068562ee1a05c698a7a95f4a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4876 wrote to memory of 4336 4876 4fd82337068562ee1a05c698a7a95f4a.exe 15 PID 4876 wrote to memory of 4336 4876 4fd82337068562ee1a05c698a7a95f4a.exe 15 PID 4876 wrote to memory of 4336 4876 4fd82337068562ee1a05c698a7a95f4a.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fd82337068562ee1a05c698a7a95f4a.exe"C:\Users\Admin\AppData\Local\Temp\4fd82337068562ee1a05c698a7a95f4a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\4fd82337068562ee1a05c698a7a95f4a.exeC:\Users\Admin\AppData\Local\Temp\4fd82337068562ee1a05c698a7a95f4a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4336
-