Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 21:16
Behavioral task
behavioral1
Sample
f8aa70476b8f0bd64078e92b9fe25943.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
f8aa70476b8f0bd64078e92b9fe25943.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
f8aa70476b8f0bd64078e92b9fe25943.exe
-
Size
56KB
-
MD5
f8aa70476b8f0bd64078e92b9fe25943
-
SHA1
e9a172cb77659e473ae0878616f2ceefb68298e8
-
SHA256
be1ab208727be6391c66bdd7c6e9710a51b83960212bf4e34f15b7017a95a95c
-
SHA512
3e2fe89c125bfef38a72102c2b607aed530ddc07b08e0c5932eeea52aa398454fb9401d5eca32d8cb1eb4d60d034f9b1cc6bd56cfee3d638a59a95cfa89e030d
-
SSDEEP
768:vykY1WhABIYwbIJdtGQ4jSEUbqoQaZI3ipiUn4mLhvh97j/QkSEE0dOi9B3oH:vQ0ABbgIJdcjSVeBhWDn4w7jgJi9B3e
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3008 f8aa70476b8f0bd64078e92b9fe25943.exe -
Executes dropped EXE 1 IoCs
pid Process 3008 f8aa70476b8f0bd64078e92b9fe25943.exe -
Loads dropped DLL 1 IoCs
pid Process 2612 f8aa70476b8f0bd64078e92b9fe25943.exe -
resource yara_rule behavioral1/memory/2612-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x000c000000012261-10.dat upx behavioral1/memory/3008-17-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2612 f8aa70476b8f0bd64078e92b9fe25943.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2612 f8aa70476b8f0bd64078e92b9fe25943.exe 3008 f8aa70476b8f0bd64078e92b9fe25943.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2612 wrote to memory of 3008 2612 f8aa70476b8f0bd64078e92b9fe25943.exe 17 PID 2612 wrote to memory of 3008 2612 f8aa70476b8f0bd64078e92b9fe25943.exe 17 PID 2612 wrote to memory of 3008 2612 f8aa70476b8f0bd64078e92b9fe25943.exe 17 PID 2612 wrote to memory of 3008 2612 f8aa70476b8f0bd64078e92b9fe25943.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8aa70476b8f0bd64078e92b9fe25943.exeC:\Users\Admin\AppData\Local\Temp\f8aa70476b8f0bd64078e92b9fe25943.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3008
-
C:\Users\Admin\AppData\Local\Temp\f8aa70476b8f0bd64078e92b9fe25943.exe"C:\Users\Admin\AppData\Local\Temp\f8aa70476b8f0bd64078e92b9fe25943.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2612