Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 16:32
Behavioral task
behavioral1
Sample
f25a677ab71c243496862205afd2df53.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
f25a677ab71c243496862205afd2df53.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
f25a677ab71c243496862205afd2df53.exe
-
Size
1.5MB
-
MD5
f25a677ab71c243496862205afd2df53
-
SHA1
ef58186fa6330d39c0c053ac460a90e59781f52d
-
SHA256
cda3124ebe2d30b812f89c25aba25c6776a57ebff89fcd573498116229c65b7e
-
SHA512
48d1ce7d0b23f29145f1fd9c93260cc92104e37b8232d1608bb03519c466748f75467e0421f7d28cff418ec6b5df7affa0f786695be5254215c929c2814399c9
-
SSDEEP
24576:az0b9LTwgLKglq4O9MMvegE73m2l8nmjB9IkUW6rd2d4w4ad8hoBW:dLT/A2jp376mjsW6O4a6oB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2232 f25a677ab71c243496862205afd2df53.exe -
Executes dropped EXE 1 IoCs
pid Process 2232 f25a677ab71c243496862205afd2df53.exe -
Loads dropped DLL 1 IoCs
pid Process 2240 f25a677ab71c243496862205afd2df53.exe -
resource yara_rule behavioral1/memory/2240-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2240 f25a677ab71c243496862205afd2df53.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2240 f25a677ab71c243496862205afd2df53.exe 2232 f25a677ab71c243496862205afd2df53.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2232 2240 f25a677ab71c243496862205afd2df53.exe 16 PID 2240 wrote to memory of 2232 2240 f25a677ab71c243496862205afd2df53.exe 16 PID 2240 wrote to memory of 2232 2240 f25a677ab71c243496862205afd2df53.exe 16 PID 2240 wrote to memory of 2232 2240 f25a677ab71c243496862205afd2df53.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\f25a677ab71c243496862205afd2df53.exeC:\Users\Admin\AppData\Local\Temp\f25a677ab71c243496862205afd2df53.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2232
-
C:\Users\Admin\AppData\Local\Temp\f25a677ab71c243496862205afd2df53.exe"C:\Users\Admin\AppData\Local\Temp\f25a677ab71c243496862205afd2df53.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2240