Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 06:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0a7cee53979c2018e4fa90418ff9d987.exe
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
0a7cee53979c2018e4fa90418ff9d987.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
0a7cee53979c2018e4fa90418ff9d987.exe
-
Size
82KB
-
MD5
0a7cee53979c2018e4fa90418ff9d987
-
SHA1
450dfe5852a3445420b40d52940d106cb3a0d8f9
-
SHA256
5461f9097de1f6905fc290c5df42d1e6322b0a0e786d17b1581172f138d885ab
-
SHA512
656e12ec8634ef5dcc77e4cd66d465dca1fc045f3c1fee4f1707756f5eee56d626ba4715988f5ca5c1708b3d7554195c4edc6612b7cd800ac79a38cdd1005ec0
-
SSDEEP
1536:UoE52sCXUj/viOeA32W1CenTsLiWPHhdnAV1I2:Vfi6OeA32OC+65dnAV1N
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2388 0a7cee53979c2018e4fa90418ff9d987.exe -
Executes dropped EXE 1 IoCs
pid Process 2388 0a7cee53979c2018e4fa90418ff9d987.exe -
Loads dropped DLL 1 IoCs
pid Process 836 0a7cee53979c2018e4fa90418ff9d987.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 836 0a7cee53979c2018e4fa90418ff9d987.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 836 0a7cee53979c2018e4fa90418ff9d987.exe 2388 0a7cee53979c2018e4fa90418ff9d987.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 2388 836 0a7cee53979c2018e4fa90418ff9d987.exe 16 PID 836 wrote to memory of 2388 836 0a7cee53979c2018e4fa90418ff9d987.exe 16 PID 836 wrote to memory of 2388 836 0a7cee53979c2018e4fa90418ff9d987.exe 16 PID 836 wrote to memory of 2388 836 0a7cee53979c2018e4fa90418ff9d987.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a7cee53979c2018e4fa90418ff9d987.exeC:\Users\Admin\AppData\Local\Temp\0a7cee53979c2018e4fa90418ff9d987.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2388
-
C:\Users\Admin\AppData\Local\Temp\0a7cee53979c2018e4fa90418ff9d987.exe"C:\Users\Admin\AppData\Local\Temp\0a7cee53979c2018e4fa90418ff9d987.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:836