Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 17:04
Behavioral task
behavioral1
Sample
7ee0cba9c4fd234fd0b411e32e24735b.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
7ee0cba9c4fd234fd0b411e32e24735b.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
7ee0cba9c4fd234fd0b411e32e24735b.exe
-
Size
115KB
-
MD5
7ee0cba9c4fd234fd0b411e32e24735b
-
SHA1
7a0817b88b030f9f37c2c563b940edc3af5ef2e5
-
SHA256
7ac70fd7dad21f2091048f427c1b0255df00943a78a2babca7ab7c017514f29e
-
SHA512
ab20c80f493d696b298e834db0726e3c2cb3d2ba6d2e5519634532d9c239ab0ea9ecfb80640574fabccc3c358f74c457de60977e1a161a023d0b09edfb679045
-
SSDEEP
3072:3NzO7Er+WRY21x4p7JvPV3LbxKrUmS1SqPsc9vFv4DRtp:3NzmfWRY2SL7VKrUXPscfvORj
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2812 7ee0cba9c4fd234fd0b411e32e24735b.exe -
Executes dropped EXE 1 IoCs
pid Process 2812 7ee0cba9c4fd234fd0b411e32e24735b.exe -
Loads dropped DLL 1 IoCs
pid Process 2332 7ee0cba9c4fd234fd0b411e32e24735b.exe -
resource yara_rule behavioral1/memory/2332-0-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral1/memory/2812-18-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral1/memory/2332-16-0x0000000000170000-0x00000000001E5000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2332 7ee0cba9c4fd234fd0b411e32e24735b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2332 7ee0cba9c4fd234fd0b411e32e24735b.exe 2812 7ee0cba9c4fd234fd0b411e32e24735b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2812 2332 7ee0cba9c4fd234fd0b411e32e24735b.exe 15 PID 2332 wrote to memory of 2812 2332 7ee0cba9c4fd234fd0b411e32e24735b.exe 15 PID 2332 wrote to memory of 2812 2332 7ee0cba9c4fd234fd0b411e32e24735b.exe 15 PID 2332 wrote to memory of 2812 2332 7ee0cba9c4fd234fd0b411e32e24735b.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ee0cba9c4fd234fd0b411e32e24735b.exeC:\Users\Admin\AppData\Local\Temp\7ee0cba9c4fd234fd0b411e32e24735b.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2812
-
C:\Users\Admin\AppData\Local\Temp\7ee0cba9c4fd234fd0b411e32e24735b.exe"C:\Users\Admin\AppData\Local\Temp\7ee0cba9c4fd234fd0b411e32e24735b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2332