Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 16:05
Behavioral task
behavioral1
Sample
e7b058f15a4025a302679bbe23f72685.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
e7b058f15a4025a302679bbe23f72685.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
e7b058f15a4025a302679bbe23f72685.exe
-
Size
5.3MB
-
MD5
e7b058f15a4025a302679bbe23f72685
-
SHA1
2b99e269d37f9e89fc0dbd135b7b59b289bbaacf
-
SHA256
cbc84b8d9edb995ab81f2d1cef64a6dd03aa7f29c181ce40c63d7b9082f6a208
-
SHA512
c2f9326a781bd8f7d07d85bdf0666c935991ed50f26bdcf78af690e99b9289634d8853b4f3bfb68e6680f53bf80d771de0c497d3a656a39c29794a898b87d99d
-
SSDEEP
98304:bw3in1BHdyA9A06iVaaVIJSHhg7mwgu8+VJpoAMHdyA9A06iVaaVIJSHj:b5B9yEBhV1xBgIu8WoP9yEBhV1xD
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2892 e7b058f15a4025a302679bbe23f72685.exe -
Executes dropped EXE 1 IoCs
pid Process 2892 e7b058f15a4025a302679bbe23f72685.exe -
Loads dropped DLL 1 IoCs
pid Process 2652 e7b058f15a4025a302679bbe23f72685.exe -
resource yara_rule behavioral1/memory/2652-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2652 e7b058f15a4025a302679bbe23f72685.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2652 e7b058f15a4025a302679bbe23f72685.exe 2892 e7b058f15a4025a302679bbe23f72685.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2892 2652 e7b058f15a4025a302679bbe23f72685.exe 18 PID 2652 wrote to memory of 2892 2652 e7b058f15a4025a302679bbe23f72685.exe 18 PID 2652 wrote to memory of 2892 2652 e7b058f15a4025a302679bbe23f72685.exe 18 PID 2652 wrote to memory of 2892 2652 e7b058f15a4025a302679bbe23f72685.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7b058f15a4025a302679bbe23f72685.exe"C:\Users\Admin\AppData\Local\Temp\e7b058f15a4025a302679bbe23f72685.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\e7b058f15a4025a302679bbe23f72685.exeC:\Users\Admin\AppData\Local\Temp\e7b058f15a4025a302679bbe23f72685.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2892
-