Analysis
-
max time kernel
146s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 08:31
Behavioral task
behavioral1
Sample
50163654d6a17e8d2978464612ead67e.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
50163654d6a17e8d2978464612ead67e.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
50163654d6a17e8d2978464612ead67e.exe
-
Size
2.4MB
-
MD5
50163654d6a17e8d2978464612ead67e
-
SHA1
9fc52c34ca8223bcf8c9a307c0215279dca4830a
-
SHA256
56a2b83a15b4c7a7fc7b1517a8ca69a5cc33558c3fddd9bfaa3202e7b8d2dbca
-
SHA512
99aa2ee18ac877e7131b36335fa3a301154dc647db3329f7c0455ab17d650b105ce58e6b421e8418d99f4b4ed601b5a0db338c72e43196c35a90cf92fca5a5be
-
SSDEEP
49152:Dpfad478eO6NHkcmI3PAz2RP4M338dB2IBlGuuDVUsdxxjr:Dy47VBecmFIgg3gnl/IVUs1jr
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4000 50163654d6a17e8d2978464612ead67e.exe -
Executes dropped EXE 1 IoCs
pid Process 4000 50163654d6a17e8d2978464612ead67e.exe -
resource yara_rule behavioral2/memory/3504-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/4000-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3504 50163654d6a17e8d2978464612ead67e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3504 50163654d6a17e8d2978464612ead67e.exe 4000 50163654d6a17e8d2978464612ead67e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3504 wrote to memory of 4000 3504 50163654d6a17e8d2978464612ead67e.exe 19 PID 3504 wrote to memory of 4000 3504 50163654d6a17e8d2978464612ead67e.exe 19 PID 3504 wrote to memory of 4000 3504 50163654d6a17e8d2978464612ead67e.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\50163654d6a17e8d2978464612ead67e.exe"C:\Users\Admin\AppData\Local\Temp\50163654d6a17e8d2978464612ead67e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\50163654d6a17e8d2978464612ead67e.exeC:\Users\Admin\AppData\Local\Temp\50163654d6a17e8d2978464612ead67e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4000
-