Analysis
-
max time kernel
0s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 12:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1fdc45824461d23cfa70c414b90cb930.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
1fdc45824461d23cfa70c414b90cb930.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
1fdc45824461d23cfa70c414b90cb930.exe
-
Size
385KB
-
MD5
1fdc45824461d23cfa70c414b90cb930
-
SHA1
067365fc10084bb08288b43de17bbef1927f3d81
-
SHA256
409944ac79553cd7daf1b55263800e7ad0a0cd956470a312c7162d4a3b0a4d2f
-
SHA512
7c12e664db4d79e34356ad338814cf20b48d0be42a5416acee9e60f1b70dd87767bd6873a01c34beabef1e8947a7696747073ef5812405b3c3076866d5270356
-
SSDEEP
12288:gxpaColpUi/LVWLLG2zLOhKjazLbPt6wB+gtzMD/0B:gxfolKiz4XkDl6wB+gtzMz0B
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2744 1fdc45824461d23cfa70c414b90cb930.exe -
Executes dropped EXE 1 IoCs
pid Process 2744 1fdc45824461d23cfa70c414b90cb930.exe -
Loads dropped DLL 1 IoCs
pid Process 2224 1fdc45824461d23cfa70c414b90cb930.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2224 1fdc45824461d23cfa70c414b90cb930.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2224 1fdc45824461d23cfa70c414b90cb930.exe 2744 1fdc45824461d23cfa70c414b90cb930.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2744 2224 1fdc45824461d23cfa70c414b90cb930.exe 16 PID 2224 wrote to memory of 2744 2224 1fdc45824461d23cfa70c414b90cb930.exe 16 PID 2224 wrote to memory of 2744 2224 1fdc45824461d23cfa70c414b90cb930.exe 16 PID 2224 wrote to memory of 2744 2224 1fdc45824461d23cfa70c414b90cb930.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fdc45824461d23cfa70c414b90cb930.exeC:\Users\Admin\AppData\Local\Temp\1fdc45824461d23cfa70c414b90cb930.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2744
-
C:\Users\Admin\AppData\Local\Temp\1fdc45824461d23cfa70c414b90cb930.exe"C:\Users\Admin\AppData\Local\Temp\1fdc45824461d23cfa70c414b90cb930.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2224