Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 16:53
Behavioral task
behavioral1
Sample
7e3a2244b712ca36b3f742504a1b50c8.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
7e3a2244b712ca36b3f742504a1b50c8.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
7e3a2244b712ca36b3f742504a1b50c8.exe
-
Size
56KB
-
MD5
7e3a2244b712ca36b3f742504a1b50c8
-
SHA1
813ecf3c487135dcf9ed2d9edcf4bd9b9d4103e1
-
SHA256
3422da116623db0c5fcfa2668ed33900791dbb289edab8e23aaa2391ce48fde8
-
SHA512
95233ace941154e63b22e6313f0d3d30e69690a8e2f80a5bc6b7b307a2e1a0a4260ae60861d7b3bb8b32213fb2f64cf1648eaa3122045b4f284cde5f70ccc57e
-
SSDEEP
1536:hHVSHqEWe2Mf3gPFmuQpQgT99r0LxWDHBMn:hHVvEWe2Mfwd4EAh
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3504 7e3a2244b712ca36b3f742504a1b50c8.exe -
Executes dropped EXE 1 IoCs
pid Process 3504 7e3a2244b712ca36b3f742504a1b50c8.exe -
resource yara_rule behavioral2/memory/1660-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/3504-13-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1660 7e3a2244b712ca36b3f742504a1b50c8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1660 7e3a2244b712ca36b3f742504a1b50c8.exe 3504 7e3a2244b712ca36b3f742504a1b50c8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1660 wrote to memory of 3504 1660 7e3a2244b712ca36b3f742504a1b50c8.exe 27 PID 1660 wrote to memory of 3504 1660 7e3a2244b712ca36b3f742504a1b50c8.exe 27 PID 1660 wrote to memory of 3504 1660 7e3a2244b712ca36b3f742504a1b50c8.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e3a2244b712ca36b3f742504a1b50c8.exe"C:\Users\Admin\AppData\Local\Temp\7e3a2244b712ca36b3f742504a1b50c8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\7e3a2244b712ca36b3f742504a1b50c8.exeC:\Users\Admin\AppData\Local\Temp\7e3a2244b712ca36b3f742504a1b50c8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3504
-