Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 18:29
Behavioral task
behavioral1
Sample
007f58587cca200e547226a5d3d94f8c.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
007f58587cca200e547226a5d3d94f8c.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
007f58587cca200e547226a5d3d94f8c.exe
-
Size
1.3MB
-
MD5
007f58587cca200e547226a5d3d94f8c
-
SHA1
2577cdf3697e801fbc2ef2d9c1087434e24f3907
-
SHA256
37a06220c970820419b4d2757c7c676503db281e88340a661b8a90873965387b
-
SHA512
a70af449240abe43cec50c5b23ff2b1d043ec5131f542a80facfaeb42267cd98f9ea7fcd4a6f8a38de1bf509c7b404d57f49b784ac183ee43d8009a6d832cd1e
-
SSDEEP
24576:tFJhGEb/znDJT9dSUe5GioXE9fnGEyrK7MA0qqKzyduINLCtNU9/9Us:ttdBdh8fOEBU9TtF5CteR9j
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1028 007f58587cca200e547226a5d3d94f8c.exe -
Executes dropped EXE 1 IoCs
pid Process 1028 007f58587cca200e547226a5d3d94f8c.exe -
Loads dropped DLL 1 IoCs
pid Process 1704 007f58587cca200e547226a5d3d94f8c.exe -
resource yara_rule behavioral1/memory/1704-14-0x00000000034B0000-0x0000000003997000-memory.dmp upx behavioral1/memory/1704-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1704 007f58587cca200e547226a5d3d94f8c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1704 007f58587cca200e547226a5d3d94f8c.exe 1028 007f58587cca200e547226a5d3d94f8c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1028 1704 007f58587cca200e547226a5d3d94f8c.exe 17 PID 1704 wrote to memory of 1028 1704 007f58587cca200e547226a5d3d94f8c.exe 17 PID 1704 wrote to memory of 1028 1704 007f58587cca200e547226a5d3d94f8c.exe 17 PID 1704 wrote to memory of 1028 1704 007f58587cca200e547226a5d3d94f8c.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\007f58587cca200e547226a5d3d94f8c.exe"C:\Users\Admin\AppData\Local\Temp\007f58587cca200e547226a5d3d94f8c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\007f58587cca200e547226a5d3d94f8c.exeC:\Users\Admin\AppData\Local\Temp\007f58587cca200e547226a5d3d94f8c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1028
-