Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 03:24
Behavioral task
behavioral1
Sample
02e0214956f466660eef564a02eccad1.exe
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
02e0214956f466660eef564a02eccad1.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
02e0214956f466660eef564a02eccad1.exe
-
Size
56KB
-
MD5
02e0214956f466660eef564a02eccad1
-
SHA1
e9c9eff6511283d22263c444ea6d46446a722dfa
-
SHA256
780d0c227787b3c4fab20a7aed4930d020513e502ac58d98033b26a2effea28b
-
SHA512
c3ef963aab9e93d3a673d873842a14f46a54b5c7920783870e461d558418b877e6d03fc227a4cf7ffc5b4cefc89f93b6baf00d249656e2b61117fdd7ab3db7b6
-
SSDEEP
1536:X223o0RyuxGY+avVkkD0qIGqjTFDGf9avt2I8Gn5wY6BqA:X22Y4V+a9kfqI5fF09Et2G5w3v
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3008 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 2924 02e0214956f466660eef564a02eccad1.exe 3008 Au_.exe 3008 Au_.exe -
resource yara_rule behavioral1/memory/2924-0-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2924-8-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/3008-16-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/3008-93-0x0000000000400000-0x0000000000436000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3008 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2924 wrote to memory of 3008 2924 02e0214956f466660eef564a02eccad1.exe 16 PID 2924 wrote to memory of 3008 2924 02e0214956f466660eef564a02eccad1.exe 16 PID 2924 wrote to memory of 3008 2924 02e0214956f466660eef564a02eccad1.exe 16 PID 2924 wrote to memory of 3008 2924 02e0214956f466660eef564a02eccad1.exe 16 PID 2924 wrote to memory of 3008 2924 02e0214956f466660eef564a02eccad1.exe 16 PID 2924 wrote to memory of 3008 2924 02e0214956f466660eef564a02eccad1.exe 16 PID 2924 wrote to memory of 3008 2924 02e0214956f466660eef564a02eccad1.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\02e0214956f466660eef564a02eccad1.exe"C:\Users\Admin\AppData\Local\Temp\02e0214956f466660eef564a02eccad1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:3008
-