Analysis
-
max time kernel
53s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 17:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7ee1a7c01ad1a28c3c2e59157ee32e21.exe
Resource
win7-20231129-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
7ee1a7c01ad1a28c3c2e59157ee32e21.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
7ee1a7c01ad1a28c3c2e59157ee32e21.exe
-
Size
385KB
-
MD5
7ee1a7c01ad1a28c3c2e59157ee32e21
-
SHA1
6c0b5595be1b24817ec19ffd7e2a962310c21117
-
SHA256
9d91ebccc17790a5c0988f18922fef9c7bc44446de4a7e611754043efb766745
-
SHA512
9934e1d3cb96372b518febebea9a9948c0fe9243959e6ce5b9497fc5bf18931827bfe490436b6dcbb3990bcefa7fea0e65f1be840f1fd3a08be9fd75dd27d59d
-
SSDEEP
12288:NFVqbpoVU8VynRT6gOpkCvRJc9rybmwXnB:9qdoVG96gSkCvqrMmwXB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3292 7ee1a7c01ad1a28c3c2e59157ee32e21.exe -
Executes dropped EXE 1 IoCs
pid Process 3292 7ee1a7c01ad1a28c3c2e59157ee32e21.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1252 7ee1a7c01ad1a28c3c2e59157ee32e21.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1252 7ee1a7c01ad1a28c3c2e59157ee32e21.exe 3292 7ee1a7c01ad1a28c3c2e59157ee32e21.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1252 wrote to memory of 3292 1252 7ee1a7c01ad1a28c3c2e59157ee32e21.exe 20 PID 1252 wrote to memory of 3292 1252 7ee1a7c01ad1a28c3c2e59157ee32e21.exe 20 PID 1252 wrote to memory of 3292 1252 7ee1a7c01ad1a28c3c2e59157ee32e21.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ee1a7c01ad1a28c3c2e59157ee32e21.exe"C:\Users\Admin\AppData\Local\Temp\7ee1a7c01ad1a28c3c2e59157ee32e21.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\7ee1a7c01ad1a28c3c2e59157ee32e21.exeC:\Users\Admin\AppData\Local\Temp\7ee1a7c01ad1a28c3c2e59157ee32e21.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3292
-