Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 14:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
26125d89aaab20c9509922bb9cadc723.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
26125d89aaab20c9509922bb9cadc723.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
26125d89aaab20c9509922bb9cadc723.exe
-
Size
165KB
-
MD5
26125d89aaab20c9509922bb9cadc723
-
SHA1
384a082c5e60dadca9b6c147e82146ce1b083d99
-
SHA256
96b92a40dca1fa91caaae4ef8b3206df68b02a79a76b5b01d41c87e6f1e5681c
-
SHA512
cbbd00f14cfc99e9e19e18528a19b955d7c5e2426099d3e7d80e1c42f61fe9c2626788c610ae01a02a63f29052ec41b7f0433cf706c919ccd29cde4697201856
-
SSDEEP
3072:ci46iPWP7iHi74Y7A04Fl/PfNbANvQwEy91/V+tXnAaPdMgLvSZzYzUf9N:k5WDD74zzFl/PfNbo1eAaPdMBzZ
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1940 26125d89aaab20c9509922bb9cadc723.exe -
Executes dropped EXE 1 IoCs
pid Process 1940 26125d89aaab20c9509922bb9cadc723.exe -
Loads dropped DLL 1 IoCs
pid Process 3048 26125d89aaab20c9509922bb9cadc723.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3048 26125d89aaab20c9509922bb9cadc723.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3048 26125d89aaab20c9509922bb9cadc723.exe 1940 26125d89aaab20c9509922bb9cadc723.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 1940 3048 26125d89aaab20c9509922bb9cadc723.exe 16 PID 3048 wrote to memory of 1940 3048 26125d89aaab20c9509922bb9cadc723.exe 16 PID 3048 wrote to memory of 1940 3048 26125d89aaab20c9509922bb9cadc723.exe 16 PID 3048 wrote to memory of 1940 3048 26125d89aaab20c9509922bb9cadc723.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\26125d89aaab20c9509922bb9cadc723.exe"C:\Users\Admin\AppData\Local\Temp\26125d89aaab20c9509922bb9cadc723.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\26125d89aaab20c9509922bb9cadc723.exeC:\Users\Admin\AppData\Local\Temp\26125d89aaab20c9509922bb9cadc723.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1940
-