Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 16:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f8f4dee9125e3ca3f27076a0ca627fe3.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
f8f4dee9125e3ca3f27076a0ca627fe3.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
f8f4dee9125e3ca3f27076a0ca627fe3.exe
-
Size
1.9MB
-
MD5
f8f4dee9125e3ca3f27076a0ca627fe3
-
SHA1
54b6f79bcf212968082d73212798a74d02388f7c
-
SHA256
72844caa103182d554650243b3497aa3ab99445ecb8eef9b7035d6ef1c2265a3
-
SHA512
c3063e3e93b6d083f9fb8af30c16a25fd2b317877c276c56aa3c5c9af6d7985ebd33c3dfcdbd54c02387a191c9caaf3155983a38b4c0d78434d3a861b59a7766
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10dCPl6gPDngAW/T8rsCu2YKDTRPvvPwmVbNAox:Qoa1taC070dCsgjuAPR5FPvpvJdiKz7
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1880 4154.tmp -
Executes dropped EXE 1 IoCs
pid Process 1880 4154.tmp -
Loads dropped DLL 1 IoCs
pid Process 2376 f8f4dee9125e3ca3f27076a0ca627fe3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 1880 2376 f8f4dee9125e3ca3f27076a0ca627fe3.exe 28 PID 2376 wrote to memory of 1880 2376 f8f4dee9125e3ca3f27076a0ca627fe3.exe 28 PID 2376 wrote to memory of 1880 2376 f8f4dee9125e3ca3f27076a0ca627fe3.exe 28 PID 2376 wrote to memory of 1880 2376 f8f4dee9125e3ca3f27076a0ca627fe3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8f4dee9125e3ca3f27076a0ca627fe3.exe"C:\Users\Admin\AppData\Local\Temp\f8f4dee9125e3ca3f27076a0ca627fe3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\4154.tmp"C:\Users\Admin\AppData\Local\Temp\4154.tmp" --splashC:\Users\Admin\AppData\Local\Temp\f8f4dee9125e3ca3f27076a0ca627fe3.exe CD1BCF3DD9588E813B0FB2D5C3FF4F9388148059BAE5E7CE2E98B179D73AD1707A544E10190EEA0AF1098BDB5822C483AB901304BF938BD0A09C1BAF4FA043222⤵
- Deletes itself
- Executes dropped EXE
PID:1880
-