Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 22:42
Behavioral task
behavioral1
Sample
1ecb37319a63e70a5126f4dbbda751ab.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
1ecb37319a63e70a5126f4dbbda751ab.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
1ecb37319a63e70a5126f4dbbda751ab.exe
-
Size
2.7MB
-
MD5
1ecb37319a63e70a5126f4dbbda751ab
-
SHA1
59d17c2b1c189f2c45650a0e0c78872873ee6c6e
-
SHA256
719583b9728be8d43df77929a2896da711430941e36c50f2c2aaf6b44ea95a98
-
SHA512
d94f8e3178c2ae35d33e0b61c90f57c0d4028cf09e034760e859926709befd2357eb666b0d26112fd42001ccf908bd91c722b0362bcbfa7c9d21c4521314ba6b
-
SSDEEP
49152:FwtDcWlo8vCSp7jIfbs0oiLaiNZRnQTGj113jqaQvh5heI:WtoWlo8vCSuTLXZBQT21p5eJr
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2316 1ecb37319a63e70a5126f4dbbda751ab.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 1ecb37319a63e70a5126f4dbbda751ab.exe -
Loads dropped DLL 1 IoCs
pid Process 2552 1ecb37319a63e70a5126f4dbbda751ab.exe -
resource yara_rule behavioral1/memory/2552-0-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2552 1ecb37319a63e70a5126f4dbbda751ab.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2552 1ecb37319a63e70a5126f4dbbda751ab.exe 2316 1ecb37319a63e70a5126f4dbbda751ab.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2316 2552 1ecb37319a63e70a5126f4dbbda751ab.exe 17 PID 2552 wrote to memory of 2316 2552 1ecb37319a63e70a5126f4dbbda751ab.exe 17 PID 2552 wrote to memory of 2316 2552 1ecb37319a63e70a5126f4dbbda751ab.exe 17 PID 2552 wrote to memory of 2316 2552 1ecb37319a63e70a5126f4dbbda751ab.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ecb37319a63e70a5126f4dbbda751ab.exe"C:\Users\Admin\AppData\Local\Temp\1ecb37319a63e70a5126f4dbbda751ab.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\1ecb37319a63e70a5126f4dbbda751ab.exeC:\Users\Admin\AppData\Local\Temp\1ecb37319a63e70a5126f4dbbda751ab.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2316
-