Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 18:00
Behavioral task
behavioral1
Sample
513ba360ac566f170aead4106b8fe6e6.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
513ba360ac566f170aead4106b8fe6e6.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
513ba360ac566f170aead4106b8fe6e6.exe
-
Size
1.6MB
-
MD5
513ba360ac566f170aead4106b8fe6e6
-
SHA1
d3e6ef6ea69119f576ab01938b1f66a545fc88d1
-
SHA256
11f80eae70f2b9b7ac794512c0f55e6e600c248bea6b9f583cf5f3d879063da7
-
SHA512
e638f578b1876b72ba089dea3dc8d50d9944984fbeb0de72beba10da6c074c84b3da609141848cd367aa1c62247aedf6aefecb06443c94424ed637f4856ff8f5
-
SSDEEP
24576:8SbQXpe5cvhktpe/bB3V2S7hsg8+EBCwWdVhRcWI0td:p8Ic6ObBozgkCfhRcP4d
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1012 513ba360ac566f170aead4106b8fe6e6.exe -
Executes dropped EXE 1 IoCs
pid Process 1012 513ba360ac566f170aead4106b8fe6e6.exe -
resource yara_rule behavioral2/memory/1336-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/1012-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1336 513ba360ac566f170aead4106b8fe6e6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1336 513ba360ac566f170aead4106b8fe6e6.exe 1012 513ba360ac566f170aead4106b8fe6e6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1336 wrote to memory of 1012 1336 513ba360ac566f170aead4106b8fe6e6.exe 28 PID 1336 wrote to memory of 1012 1336 513ba360ac566f170aead4106b8fe6e6.exe 28 PID 1336 wrote to memory of 1012 1336 513ba360ac566f170aead4106b8fe6e6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\513ba360ac566f170aead4106b8fe6e6.exe"C:\Users\Admin\AppData\Local\Temp\513ba360ac566f170aead4106b8fe6e6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\513ba360ac566f170aead4106b8fe6e6.exeC:\Users\Admin\AppData\Local\Temp\513ba360ac566f170aead4106b8fe6e6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1012
-