Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 07:35
Behavioral task
behavioral1
Sample
55dc32a62492d1a61b4a2f0b9a7ce65d.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
55dc32a62492d1a61b4a2f0b9a7ce65d.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
55dc32a62492d1a61b4a2f0b9a7ce65d.exe
-
Size
2.9MB
-
MD5
55dc32a62492d1a61b4a2f0b9a7ce65d
-
SHA1
814aa8f9b6d1bd76658319f195edb1eb88a6ef33
-
SHA256
c6e874784f288f40e503d728d9d292b7b09a5125138e2e2f3fde6703ff19dfc2
-
SHA512
f46bec404b5fd87f2da6adf820529a097249314cbfdcdeb7f753ed3fbb34320cc5fc29c30f0eeae1395a48db3dbbcf812af58b1905e0659a5acce395fd6d566f
-
SSDEEP
49152:m/W2/dT8yiOTio9J9zIRyqrIa47P4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:yxT8l4io9Huyqkx7gg3gnl/IVUs1jePs
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4168 55dc32a62492d1a61b4a2f0b9a7ce65d.exe -
Executes dropped EXE 1 IoCs
pid Process 4168 55dc32a62492d1a61b4a2f0b9a7ce65d.exe -
resource yara_rule behavioral2/memory/4168-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/5072-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5072 55dc32a62492d1a61b4a2f0b9a7ce65d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5072 55dc32a62492d1a61b4a2f0b9a7ce65d.exe 4168 55dc32a62492d1a61b4a2f0b9a7ce65d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5072 wrote to memory of 4168 5072 55dc32a62492d1a61b4a2f0b9a7ce65d.exe 16 PID 5072 wrote to memory of 4168 5072 55dc32a62492d1a61b4a2f0b9a7ce65d.exe 16 PID 5072 wrote to memory of 4168 5072 55dc32a62492d1a61b4a2f0b9a7ce65d.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\55dc32a62492d1a61b4a2f0b9a7ce65d.exe"C:\Users\Admin\AppData\Local\Temp\55dc32a62492d1a61b4a2f0b9a7ce65d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\55dc32a62492d1a61b4a2f0b9a7ce65d.exeC:\Users\Admin\AppData\Local\Temp\55dc32a62492d1a61b4a2f0b9a7ce65d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4168
-