Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 23:49
Behavioral task
behavioral1
Sample
4450a5abc48b1b16fd5e892a026c5558.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
4450a5abc48b1b16fd5e892a026c5558.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
4450a5abc48b1b16fd5e892a026c5558.exe
-
Size
59KB
-
MD5
4450a5abc48b1b16fd5e892a026c5558
-
SHA1
83e9d363c93fab06312cd1e24c6bb372e417746f
-
SHA256
4841e6056a8e0081225ff5ad56f0e20bac46e1e00f93c5ed70fbff9cd93f9a9a
-
SHA512
af639c2061e028fe99a2556ae8304720f5d8f6a5a61a03b806aa5d461c573e37c96d3f4502d3f6cd75298eee817009a7eeed4b07ff656f1b8c61359dac530554
-
SSDEEP
1536:AZruOQGX7ofJo0ryzrpQda+YZ1y4BQOFMVy17nEi5m:6y7gr6MnZoJOFMmnEik
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2276 4450a5abc48b1b16fd5e892a026c5558.exe -
Executes dropped EXE 1 IoCs
pid Process 2276 4450a5abc48b1b16fd5e892a026c5558.exe -
Loads dropped DLL 1 IoCs
pid Process 2000 4450a5abc48b1b16fd5e892a026c5558.exe -
resource yara_rule behavioral1/memory/2000-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/files/0x000b000000012731-10.dat upx behavioral1/memory/2276-16-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2000 4450a5abc48b1b16fd5e892a026c5558.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2000 4450a5abc48b1b16fd5e892a026c5558.exe 2276 4450a5abc48b1b16fd5e892a026c5558.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2276 2000 4450a5abc48b1b16fd5e892a026c5558.exe 29 PID 2000 wrote to memory of 2276 2000 4450a5abc48b1b16fd5e892a026c5558.exe 29 PID 2000 wrote to memory of 2276 2000 4450a5abc48b1b16fd5e892a026c5558.exe 29 PID 2000 wrote to memory of 2276 2000 4450a5abc48b1b16fd5e892a026c5558.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4450a5abc48b1b16fd5e892a026c5558.exe"C:\Users\Admin\AppData\Local\Temp\4450a5abc48b1b16fd5e892a026c5558.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\4450a5abc48b1b16fd5e892a026c5558.exeC:\Users\Admin\AppData\Local\Temp\4450a5abc48b1b16fd5e892a026c5558.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2276
-