Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:53
Behavioral task
behavioral1
Sample
7709e0e9732c4bd373314eef200c9412.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
7709e0e9732c4bd373314eef200c9412.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
7709e0e9732c4bd373314eef200c9412.exe
-
Size
1.3MB
-
MD5
7709e0e9732c4bd373314eef200c9412
-
SHA1
3c0614958ce19cd09c1490155d009716e5cc3ceb
-
SHA256
1122f0d9fccd30e0cafe26915489986233a6d446901a3847c287879b7c4ee08d
-
SHA512
cbddaffc6090bbbf9e05c73a0864052927da888b33a753e03e548add81e798f9e83f2efb7c017c22ca670790d48e355586345c3c6b014a2f43fc8c12aa2b0f81
-
SSDEEP
24576:jESqIkRxn/tXZuIN8HddNlKg9NIaYTHwOl62gamF8OpO8ovG:jT/slXMw8HddNlKgqTH9I1p3
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2296 7709e0e9732c4bd373314eef200c9412.exe -
Executes dropped EXE 1 IoCs
pid Process 2296 7709e0e9732c4bd373314eef200c9412.exe -
Loads dropped DLL 1 IoCs
pid Process 1848 7709e0e9732c4bd373314eef200c9412.exe -
resource yara_rule behavioral1/memory/1848-0-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1848 7709e0e9732c4bd373314eef200c9412.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1848 7709e0e9732c4bd373314eef200c9412.exe 2296 7709e0e9732c4bd373314eef200c9412.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2296 1848 7709e0e9732c4bd373314eef200c9412.exe 16 PID 1848 wrote to memory of 2296 1848 7709e0e9732c4bd373314eef200c9412.exe 16 PID 1848 wrote to memory of 2296 1848 7709e0e9732c4bd373314eef200c9412.exe 16 PID 1848 wrote to memory of 2296 1848 7709e0e9732c4bd373314eef200c9412.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\7709e0e9732c4bd373314eef200c9412.exeC:\Users\Admin\AppData\Local\Temp\7709e0e9732c4bd373314eef200c9412.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2296
-
C:\Users\Admin\AppData\Local\Temp\7709e0e9732c4bd373314eef200c9412.exe"C:\Users\Admin\AppData\Local\Temp\7709e0e9732c4bd373314eef200c9412.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1848