Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 19:21
Behavioral task
behavioral1
Sample
378a4914e5bae07027c76524b9d9f7fe.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
378a4914e5bae07027c76524b9d9f7fe.exe
-
Size
402KB
-
MD5
378a4914e5bae07027c76524b9d9f7fe
-
SHA1
b6bc0e5ae3c8de4ecc6e44d8c72fe683f28bec43
-
SHA256
bee0493124ea93b12b32dfa376355d2cae6d81ce736732ffbe091e33e1668f2f
-
SHA512
9e29333f3eeafa3c1f1e98d050e6aa125e347d11024e395ba17799772b454338451025f9c6fc219d030b5519cf020f2816af5ddd3b02fa87c6b5f9ba13cd60e5
-
SSDEEP
6144:amaKVBGmE84IMNv55giU0pKiFYHxfx15RvOagakZBxkTN2gmeGcFnVQb/DAYbDgl:jSmLAuEY71fviagATFmebVQDcYc5
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2144 test.exe 2736 Trojan.exe -
Loads dropped DLL 2 IoCs
pid Process 2116 cmd.exe 2144 test.exe -
resource yara_rule behavioral1/memory/1916-0-0x0000000000400000-0x00000000004FB000-memory.dmp upx behavioral1/memory/1916-20-0x0000000000400000-0x00000000004FB000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2116 1916 378a4914e5bae07027c76524b9d9f7fe.exe 16 PID 1916 wrote to memory of 2116 1916 378a4914e5bae07027c76524b9d9f7fe.exe 16 PID 1916 wrote to memory of 2116 1916 378a4914e5bae07027c76524b9d9f7fe.exe 16 PID 1916 wrote to memory of 2116 1916 378a4914e5bae07027c76524b9d9f7fe.exe 16 PID 2116 wrote to memory of 2144 2116 cmd.exe 18 PID 2116 wrote to memory of 2144 2116 cmd.exe 18 PID 2116 wrote to memory of 2144 2116 cmd.exe 18 PID 2116 wrote to memory of 2144 2116 cmd.exe 18 PID 2144 wrote to memory of 2736 2144 test.exe 30 PID 2144 wrote to memory of 2736 2144 test.exe 30 PID 2144 wrote to memory of 2736 2144 test.exe 30 PID 2144 wrote to memory of 2736 2144 test.exe 30
Processes
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c test.exe1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\test.exetest.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"3⤵
- Executes dropped EXE
PID:2736
-
-
-
C:\Users\Admin\AppData\Local\Temp\378a4914e5bae07027c76524b9d9f7fe.exe"C:\Users\Admin\AppData\Local\Temp\378a4914e5bae07027c76524b9d9f7fe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1916