Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 00:21
Behavioral task
behavioral1
Sample
4606ced349f4e303604d1955574ef991.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
4606ced349f4e303604d1955574ef991.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
4606ced349f4e303604d1955574ef991.exe
-
Size
320KB
-
MD5
4606ced349f4e303604d1955574ef991
-
SHA1
9a2c293ba6cf050d574ec6abb081f0767304f897
-
SHA256
dcfe8ca8ac3476cb814d569094689cdf1ce6aee0d962132412340191daa54a16
-
SHA512
c3c6a6851a3fa900c7993698ebf4b13797c575ad5e57f23f59c9d385b7b8a8b90262801e68d4a31e43105e90acef58969a660bed02e744e2b4fb0586ad2d75e4
-
SSDEEP
6144:XKlXYj5phq5/0PkZ/WxPU0UhMda/99JkwFFdK03RDA3DRoSLgk6MG58q:5d76akZ/APd4Mda3JkwVKH3DRoSLgkG8
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2068 4606ced349f4e303604d1955574ef991.exe -
resource yara_rule behavioral1/memory/2268-0-0x0000000000B20000-0x0000000000C10000-memory.dmp upx behavioral1/memory/2268-1-0x0000000002E60000-0x0000000002F50000-memory.dmp upx behavioral1/memory/2068-4-0x0000000000B20000-0x0000000000C10000-memory.dmp upx behavioral1/memory/2268-3-0x0000000000B20000-0x0000000000C10000-memory.dmp upx behavioral1/memory/2068-14-0x0000000000B20000-0x0000000000C10000-memory.dmp upx behavioral1/memory/2068-19-0x0000000000B20000-0x0000000000C10000-memory.dmp upx behavioral1/memory/2068-29-0x0000000000B20000-0x0000000000C10000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2068 2268 4606ced349f4e303604d1955574ef991.exe 28 PID 2268 wrote to memory of 2068 2268 4606ced349f4e303604d1955574ef991.exe 28 PID 2268 wrote to memory of 2068 2268 4606ced349f4e303604d1955574ef991.exe 28 PID 2268 wrote to memory of 2068 2268 4606ced349f4e303604d1955574ef991.exe 28 PID 2268 wrote to memory of 2068 2268 4606ced349f4e303604d1955574ef991.exe 28 PID 2268 wrote to memory of 2068 2268 4606ced349f4e303604d1955574ef991.exe 28 PID 2268 wrote to memory of 2068 2268 4606ced349f4e303604d1955574ef991.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4606ced349f4e303604d1955574ef991.exe"C:\Users\Admin\AppData\Local\Temp\4606ced349f4e303604d1955574ef991.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\4606ced349f4e303604d1955574ef991.exe"C:\Users\Admin\AppData\Local\Temp\4606ced349f4e303604d1955574ef991.exe" /A2⤵
- Loads dropped DLL
PID:2068
-