Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 17:21
Behavioral task
behavioral1
Sample
ff76cc5bb7aaecbdbdde6ae592b0ef0a.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
ff76cc5bb7aaecbdbdde6ae592b0ef0a.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
ff76cc5bb7aaecbdbdde6ae592b0ef0a.exe
-
Size
5.8MB
-
MD5
ff76cc5bb7aaecbdbdde6ae592b0ef0a
-
SHA1
87456fcd211d949fcc1c131eb7f02fda318b20dc
-
SHA256
e6e7a0f2da53e04d64599a85d4487c44c6e983af58c34d95bce7dc9fc93391ea
-
SHA512
447051cb18ebb572cfefc809f10373fb4e6743ab4584eeec8abb212b702b7f683e31078ce6befbda6dd87f4c2ce76b6e33da3a87f0cdd18d3d49fefe5b17e7ec
-
SSDEEP
98304:vem/1gwg8L54HBUCczzM3dO/rQy+IJUTo4HBUCczzM3:vxdgCuWCByrh+HWC
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2088 ff76cc5bb7aaecbdbdde6ae592b0ef0a.exe -
Executes dropped EXE 1 IoCs
pid Process 2088 ff76cc5bb7aaecbdbdde6ae592b0ef0a.exe -
Loads dropped DLL 1 IoCs
pid Process 1928 ff76cc5bb7aaecbdbdde6ae592b0ef0a.exe -
resource yara_rule behavioral1/memory/1928-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/memory/2088-17-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1928 ff76cc5bb7aaecbdbdde6ae592b0ef0a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1928 ff76cc5bb7aaecbdbdde6ae592b0ef0a.exe 2088 ff76cc5bb7aaecbdbdde6ae592b0ef0a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2088 1928 ff76cc5bb7aaecbdbdde6ae592b0ef0a.exe 28 PID 1928 wrote to memory of 2088 1928 ff76cc5bb7aaecbdbdde6ae592b0ef0a.exe 28 PID 1928 wrote to memory of 2088 1928 ff76cc5bb7aaecbdbdde6ae592b0ef0a.exe 28 PID 1928 wrote to memory of 2088 1928 ff76cc5bb7aaecbdbdde6ae592b0ef0a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff76cc5bb7aaecbdbdde6ae592b0ef0a.exe"C:\Users\Admin\AppData\Local\Temp\ff76cc5bb7aaecbdbdde6ae592b0ef0a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\ff76cc5bb7aaecbdbdde6ae592b0ef0a.exeC:\Users\Admin\AppData\Local\Temp\ff76cc5bb7aaecbdbdde6ae592b0ef0a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2088
-