Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 16:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7e7ae146e25cd9fb47541d0cf1ce88d2.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
7e7ae146e25cd9fb47541d0cf1ce88d2.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
7e7ae146e25cd9fb47541d0cf1ce88d2.exe
-
Size
385KB
-
MD5
7e7ae146e25cd9fb47541d0cf1ce88d2
-
SHA1
b3cae76072e845037041931d26c07007b2212250
-
SHA256
bc04fb27581856803a5872bd14aee3970d821649d2438a6e75bb4d434ffe8a06
-
SHA512
3102f3717dd055b164f6d09b68edc85617e2283cd3b43dd81f7502106eefc4a600d9acb22949db639086b024223e0aa51279684c6bd6193c809ee4ea642718bb
-
SSDEEP
12288:oC7stJ+mbhJuIoA5cTiM1K8P31QJ8vwZMix5DB:9InNyA5cPrf1QgwZMixB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 964 7e7ae146e25cd9fb47541d0cf1ce88d2.exe -
Executes dropped EXE 1 IoCs
pid Process 964 7e7ae146e25cd9fb47541d0cf1ce88d2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2372 7e7ae146e25cd9fb47541d0cf1ce88d2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2372 7e7ae146e25cd9fb47541d0cf1ce88d2.exe 964 7e7ae146e25cd9fb47541d0cf1ce88d2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2372 wrote to memory of 964 2372 7e7ae146e25cd9fb47541d0cf1ce88d2.exe 15 PID 2372 wrote to memory of 964 2372 7e7ae146e25cd9fb47541d0cf1ce88d2.exe 15 PID 2372 wrote to memory of 964 2372 7e7ae146e25cd9fb47541d0cf1ce88d2.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e7ae146e25cd9fb47541d0cf1ce88d2.exe"C:\Users\Admin\AppData\Local\Temp\7e7ae146e25cd9fb47541d0cf1ce88d2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\7e7ae146e25cd9fb47541d0cf1ce88d2.exeC:\Users\Admin\AppData\Local\Temp\7e7ae146e25cd9fb47541d0cf1ce88d2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:964
-