Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 01:21
Behavioral task
behavioral1
Sample
c75258ed679a5e9f57759af2dd46a486.exe
Resource
win7-20240215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
c75258ed679a5e9f57759af2dd46a486.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
c75258ed679a5e9f57759af2dd46a486.exe
-
Size
1.3MB
-
MD5
c75258ed679a5e9f57759af2dd46a486
-
SHA1
0dc60fe881e97dfd035e3f1014fd7af30ccfc329
-
SHA256
2da91910c7baec0bfcac005578e4718538d995a2d8932b9e9b08bc9d0d71fdaa
-
SHA512
13fe911724c40c09f202b3ece3c2253b716e5685d052eee978cd89187bf0dac3f90687643730e0f3655bcf825ada0a944e5cc707e63e2d1d1d3131ef0eac30e5
-
SSDEEP
24576:t0h4MXlVO6wXq+LCaXA3I58g9ubs9A98j21MPgTGZ1qIqvG:W1o6wXq+LCcVyWubZ98cMIG/q
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2144 c75258ed679a5e9f57759af2dd46a486.exe -
Executes dropped EXE 1 IoCs
pid Process 2144 c75258ed679a5e9f57759af2dd46a486.exe -
resource yara_rule behavioral2/memory/4796-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x00090000000231f3-13.dat upx behavioral2/memory/2144-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4796 c75258ed679a5e9f57759af2dd46a486.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4796 c75258ed679a5e9f57759af2dd46a486.exe 2144 c75258ed679a5e9f57759af2dd46a486.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4796 wrote to memory of 2144 4796 c75258ed679a5e9f57759af2dd46a486.exe 85 PID 4796 wrote to memory of 2144 4796 c75258ed679a5e9f57759af2dd46a486.exe 85 PID 4796 wrote to memory of 2144 4796 c75258ed679a5e9f57759af2dd46a486.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c75258ed679a5e9f57759af2dd46a486.exe"C:\Users\Admin\AppData\Local\Temp\c75258ed679a5e9f57759af2dd46a486.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\c75258ed679a5e9f57759af2dd46a486.exeC:\Users\Admin\AppData\Local\Temp\c75258ed679a5e9f57759af2dd46a486.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2144
-