Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 05:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
076b1029fa0208170f1dfdfc9b61ea97.exe
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
076b1029fa0208170f1dfdfc9b61ea97.exe
Resource
win10v2004-20231222-en
5 signatures
150 seconds
General
-
Target
076b1029fa0208170f1dfdfc9b61ea97.exe
-
Size
84KB
-
MD5
076b1029fa0208170f1dfdfc9b61ea97
-
SHA1
bdaabeec4a03133927b7f6bba5de2f2e1385c2b7
-
SHA256
78ffdceb7f3ffbb3fa563c9346db4b24ceefce71ce90504b2456dc54c20b53e7
-
SHA512
d87f55dec03234565de7efcba23f1fb478590b8e122368cb8e12a0fa20bbb77513280e0380b94a505e76ab60affecf88cdeba2a2af2fab65758082b79e3ed2df
-
SSDEEP
1536:zLe4zwuq2YFGtLjAwq2pH/zEVDZVmB8YFQvPq9PsPl1PsXZKwcvjJ37K3OQ+7n:PXkF2YL525gMhsiBsPvPskJrK3q7n
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1260 076b1029fa0208170f1dfdfc9b61ea97.exe -
Executes dropped EXE 1 IoCs
pid Process 1260 076b1029fa0208170f1dfdfc9b61ea97.exe -
Loads dropped DLL 1 IoCs
pid Process 2372 076b1029fa0208170f1dfdfc9b61ea97.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2372 076b1029fa0208170f1dfdfc9b61ea97.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2372 076b1029fa0208170f1dfdfc9b61ea97.exe 1260 076b1029fa0208170f1dfdfc9b61ea97.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1260 2372 076b1029fa0208170f1dfdfc9b61ea97.exe 16 PID 2372 wrote to memory of 1260 2372 076b1029fa0208170f1dfdfc9b61ea97.exe 16 PID 2372 wrote to memory of 1260 2372 076b1029fa0208170f1dfdfc9b61ea97.exe 16 PID 2372 wrote to memory of 1260 2372 076b1029fa0208170f1dfdfc9b61ea97.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\076b1029fa0208170f1dfdfc9b61ea97.exe"C:\Users\Admin\AppData\Local\Temp\076b1029fa0208170f1dfdfc9b61ea97.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\076b1029fa0208170f1dfdfc9b61ea97.exeC:\Users\Admin\AppData\Local\Temp\076b1029fa0208170f1dfdfc9b61ea97.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1260
-