Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 20:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
03a9271c12558388bce7e27db4980912.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
03a9271c12558388bce7e27db4980912.exe
Resource
win10v2004-20231222-en
5 signatures
150 seconds
General
-
Target
03a9271c12558388bce7e27db4980912.exe
-
Size
82KB
-
MD5
03a9271c12558388bce7e27db4980912
-
SHA1
2d129bb3a4adc8290c6f83fb88f156881e0ea128
-
SHA256
0d5a436032b5d00d3cc83ef0031aa75e424dc7a11ee8cc2063d0315474f28960
-
SHA512
1e4d96d153b340c53e48d7c402339b604704cdc91ed5ac88a6ad6e00a8c19fc742598c07bb1a70332238f94e95058ad36923f1e2fbb203be35845b05b49aeba1
-
SSDEEP
1536:LfXLBn/Joyk267UphnnaJpmhqQZ8uolkdauEMgf28Y8UTAodT05:LfXLpRK7in1hVe+BENg8UU605
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2284 03a9271c12558388bce7e27db4980912.exe -
Executes dropped EXE 1 IoCs
pid Process 2284 03a9271c12558388bce7e27db4980912.exe -
Loads dropped DLL 1 IoCs
pid Process 1800 03a9271c12558388bce7e27db4980912.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1800 03a9271c12558388bce7e27db4980912.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1800 03a9271c12558388bce7e27db4980912.exe 2284 03a9271c12558388bce7e27db4980912.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2284 1800 03a9271c12558388bce7e27db4980912.exe 14 PID 1800 wrote to memory of 2284 1800 03a9271c12558388bce7e27db4980912.exe 14 PID 1800 wrote to memory of 2284 1800 03a9271c12558388bce7e27db4980912.exe 14 PID 1800 wrote to memory of 2284 1800 03a9271c12558388bce7e27db4980912.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\03a9271c12558388bce7e27db4980912.exeC:\Users\Admin\AppData\Local\Temp\03a9271c12558388bce7e27db4980912.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2284
-
C:\Users\Admin\AppData\Local\Temp\03a9271c12558388bce7e27db4980912.exe"C:\Users\Admin\AppData\Local\Temp\03a9271c12558388bce7e27db4980912.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1800