Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 22:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1f13f196a675760a374b24c5531bcd7e.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
1f13f196a675760a374b24c5531bcd7e.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
1f13f196a675760a374b24c5531bcd7e.exe
-
Size
1.9MB
-
MD5
1f13f196a675760a374b24c5531bcd7e
-
SHA1
c9da539e1f0b47594b5c04f81cf5b510a024822f
-
SHA256
3057b06c0343fbf9b9062cc082e61d1b48fc14df22bff99c91f812139ab0d6bb
-
SHA512
5a949cebe189ce9468485989033d1f34d465a16e5c222e4cddb49c5f994121cb2e8b81edbb8ca42940977a71fef9d33f9f2e6e7c93e69f07a786e1e6b04d93a4
-
SSDEEP
49152:Qoa1taC070dWupqenyTXrSUv6iJa9IBC4ojWRFsUB:Qoa1taC0T/enyv5Jsj4ZvXB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2328 9E0.tmp -
Executes dropped EXE 1 IoCs
pid Process 2328 9E0.tmp -
Loads dropped DLL 1 IoCs
pid Process 1712 1f13f196a675760a374b24c5531bcd7e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2328 1712 1f13f196a675760a374b24c5531bcd7e.exe 28 PID 1712 wrote to memory of 2328 1712 1f13f196a675760a374b24c5531bcd7e.exe 28 PID 1712 wrote to memory of 2328 1712 1f13f196a675760a374b24c5531bcd7e.exe 28 PID 1712 wrote to memory of 2328 1712 1f13f196a675760a374b24c5531bcd7e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f13f196a675760a374b24c5531bcd7e.exe"C:\Users\Admin\AppData\Local\Temp\1f13f196a675760a374b24c5531bcd7e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\9E0.tmp"C:\Users\Admin\AppData\Local\Temp\9E0.tmp" --splashC:\Users\Admin\AppData\Local\Temp\1f13f196a675760a374b24c5531bcd7e.exe 495FC0676262ADBDBE24F4FFFF03780B68223403A3B2F772B11D82A6012E530900D4002FF1924C8993CE656FF14D2CA739A9F080FC484D56CCB88CAE6576704C2⤵
- Deletes itself
- Executes dropped EXE
PID:2328
-