Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 17:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7eb09d4441cc537b2cba708d3e8140f1.exe
Resource
win7-20231215-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
7eb09d4441cc537b2cba708d3e8140f1.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
7eb09d4441cc537b2cba708d3e8140f1.exe
-
Size
57KB
-
MD5
7eb09d4441cc537b2cba708d3e8140f1
-
SHA1
8d2737bbc047a086548e1754235693606e79afdf
-
SHA256
4d17397fbfe2c94f95cf3a0eeabf02f19b931f6c699f1b727d1e9554f03ae579
-
SHA512
9f7f06fb6c3bf3b55bbf0ef0a64c11e7169049b3dbf12eb5ae649414ebe39bf1d0ea8eb40410ec107e11a1b599b56ef6b1a6fda99392b6dbbcaa5c0a31ddf1d3
-
SSDEEP
1536:/mjRKT1V0ZgMyIGB7VpUn0FxFLP3RtMIT/B6cE:/mQRV0ZbfM78n0FD0ap6cE
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4404 7eb09d4441cc537b2cba708d3e8140f1.exe -
Executes dropped EXE 1 IoCs
pid Process 4404 7eb09d4441cc537b2cba708d3e8140f1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4012 7eb09d4441cc537b2cba708d3e8140f1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4012 7eb09d4441cc537b2cba708d3e8140f1.exe 4404 7eb09d4441cc537b2cba708d3e8140f1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4012 wrote to memory of 4404 4012 7eb09d4441cc537b2cba708d3e8140f1.exe 25 PID 4012 wrote to memory of 4404 4012 7eb09d4441cc537b2cba708d3e8140f1.exe 25 PID 4012 wrote to memory of 4404 4012 7eb09d4441cc537b2cba708d3e8140f1.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eb09d4441cc537b2cba708d3e8140f1.exe"C:\Users\Admin\AppData\Local\Temp\7eb09d4441cc537b2cba708d3e8140f1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\7eb09d4441cc537b2cba708d3e8140f1.exeC:\Users\Admin\AppData\Local\Temp\7eb09d4441cc537b2cba708d3e8140f1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4404
-