Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
abeac3414a2f6c21364aba2502ab5b6e.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
abeac3414a2f6c21364aba2502ab5b6e.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
abeac3414a2f6c21364aba2502ab5b6e.exe
-
Size
1.1MB
-
MD5
abeac3414a2f6c21364aba2502ab5b6e
-
SHA1
dfeed6ab307c4e5bdd03ba39fa1a5cddae14c7be
-
SHA256
fd533f74afd76517edd7924d5368d2f3410942cadb974ed8eff6d63b64bbbd54
-
SHA512
fcf9e05634459796e0952c460b6391d9572174df2e101d2cbe6bf937d48d112a52a1ef81b119a11d48b79b9b6a57fcb5b9d5a0df16cfbe814a701a5017dbde53
-
SSDEEP
24576:SypW9SgLNZaOdcTMuUvxIgVHLWKY855u+KetHKq/AQAyW/yD0:St9SgLNZa6xIm9Y8H9TAQZW/e0
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2728 9A2.tmp -
Executes dropped EXE 1 IoCs
pid Process 2728 9A2.tmp -
Loads dropped DLL 1 IoCs
pid Process 3064 abeac3414a2f6c21364aba2502ab5b6e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2728 3064 abeac3414a2f6c21364aba2502ab5b6e.exe 16 PID 3064 wrote to memory of 2728 3064 abeac3414a2f6c21364aba2502ab5b6e.exe 16 PID 3064 wrote to memory of 2728 3064 abeac3414a2f6c21364aba2502ab5b6e.exe 16 PID 3064 wrote to memory of 2728 3064 abeac3414a2f6c21364aba2502ab5b6e.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\9A2.tmp"C:\Users\Admin\AppData\Local\Temp\9A2.tmp" --pingC:\Users\Admin\AppData\Local\Temp\abeac3414a2f6c21364aba2502ab5b6e.exe D982D1DDBB3B0E37E1D99030EB15729FA8A9867C3435021818CA84BFD4DD4AABD8657A0C49290AF569083D0B8076E6782DB84DA4634027FF5846A1B47BCE3CA01⤵
- Deletes itself
- Executes dropped EXE
PID:2728
-
C:\Users\Admin\AppData\Local\Temp\abeac3414a2f6c21364aba2502ab5b6e.exe"C:\Users\Admin\AppData\Local\Temp\abeac3414a2f6c21364aba2502ab5b6e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3064