Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
fb68f69257f2a0faf58188abd67b5dab.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
fb68f69257f2a0faf58188abd67b5dab.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
fb68f69257f2a0faf58188abd67b5dab.exe
-
Size
17.5MB
-
MD5
fb68f69257f2a0faf58188abd67b5dab
-
SHA1
f5bb54160ecc6457ee27dab63e3c7284a59428cd
-
SHA256
8a9d2b5f0d22049ff9d38b43f773c1f12d6af0beaf7a5c09b315f30904991b41
-
SHA512
8c752647f0e227d984406dfebece08412e6be2e15b5795f89cf0c466c0bdf2ce5b4461822af9180649a35a3db1f6338130cff523ffe2bbdc0fb445e1903ab88d
-
SSDEEP
393216:C86lkWwPDLTjT8UwkF1cMe9YKqfzNOqLHCH0PT+K+ZprTSL/CIv:slCnjIcF1TeOKqL3rCUL3+ZprTSLB
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2512 fb68f69257f2a0faf58188abd67b5dab.tmp -
Loads dropped DLL 3 IoCs
pid Process 2224 fb68f69257f2a0faf58188abd67b5dab.exe 2512 fb68f69257f2a0faf58188abd67b5dab.tmp 2512 fb68f69257f2a0faf58188abd67b5dab.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2512 fb68f69257f2a0faf58188abd67b5dab.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2512 2224 fb68f69257f2a0faf58188abd67b5dab.exe 16 PID 2224 wrote to memory of 2512 2224 fb68f69257f2a0faf58188abd67b5dab.exe 16 PID 2224 wrote to memory of 2512 2224 fb68f69257f2a0faf58188abd67b5dab.exe 16 PID 2224 wrote to memory of 2512 2224 fb68f69257f2a0faf58188abd67b5dab.exe 16 PID 2224 wrote to memory of 2512 2224 fb68f69257f2a0faf58188abd67b5dab.exe 16 PID 2224 wrote to memory of 2512 2224 fb68f69257f2a0faf58188abd67b5dab.exe 16 PID 2224 wrote to memory of 2512 2224 fb68f69257f2a0faf58188abd67b5dab.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\is-F1S4Q.tmp\fb68f69257f2a0faf58188abd67b5dab.tmp"C:\Users\Admin\AppData\Local\Temp\is-F1S4Q.tmp\fb68f69257f2a0faf58188abd67b5dab.tmp" /SL5="$30130,18067864,54272,C:\Users\Admin\AppData\Local\Temp\fb68f69257f2a0faf58188abd67b5dab.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2512
-
C:\Users\Admin\AppData\Local\Temp\fb68f69257f2a0faf58188abd67b5dab.exe"C:\Users\Admin\AppData\Local\Temp\fb68f69257f2a0faf58188abd67b5dab.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224