Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 22:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0545c2c775457e33583afa57d95216e6.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
0545c2c775457e33583afa57d95216e6.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
0545c2c775457e33583afa57d95216e6.exe
-
Size
1.5MB
-
MD5
0545c2c775457e33583afa57d95216e6
-
SHA1
40709b7beca79298cc1c0d1e1f1caf18fec4a57c
-
SHA256
982845cb49530a1b7569c01a83762f8e793c5b86a8757f5bdd092228c0f231bc
-
SHA512
bc113f5ce146b992f7074f95440ebeaefc3c875a06a0510524cb3524528fb8080e041a5bed096123b962662bddab90971182f8241dcc57fcb173a9653f59c428
-
SSDEEP
24576:e9dG37Vk0R07Qanm9dH8+lgfEPtVbzW+s8t1ckux2GlntbPwG:lrq0R07QQm3HHYETs8tOku0AaG
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1944 D78.tmp -
Executes dropped EXE 1 IoCs
pid Process 1944 D78.tmp -
Loads dropped DLL 1 IoCs
pid Process 1692 0545c2c775457e33583afa57d95216e6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1692 wrote to memory of 1944 1692 0545c2c775457e33583afa57d95216e6.exe 14 PID 1692 wrote to memory of 1944 1692 0545c2c775457e33583afa57d95216e6.exe 14 PID 1692 wrote to memory of 1944 1692 0545c2c775457e33583afa57d95216e6.exe 14 PID 1692 wrote to memory of 1944 1692 0545c2c775457e33583afa57d95216e6.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\D78.tmp"C:\Users\Admin\AppData\Local\Temp\D78.tmp" --pingC:\Users\Admin\AppData\Local\Temp\0545c2c775457e33583afa57d95216e6.exe 36C03A153CB644247A41C6B82570C03A6570E66EB9B10F5BF73C15AA3BE79D3A29B34D3107A465F186AE0E2F3CD782B9F03D32D24C79576298D3BBF14C66A32E1⤵
- Deletes itself
- Executes dropped EXE
PID:1944
-
C:\Users\Admin\AppData\Local\Temp\0545c2c775457e33583afa57d95216e6.exe"C:\Users\Admin\AppData\Local\Temp\0545c2c775457e33583afa57d95216e6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1692