Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 00:21
Behavioral task
behavioral1
Sample
085e6b6051db8c94c817b11991b9cdcc.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
085e6b6051db8c94c817b11991b9cdcc.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
085e6b6051db8c94c817b11991b9cdcc.exe
-
Size
2.9MB
-
MD5
085e6b6051db8c94c817b11991b9cdcc
-
SHA1
341cf2bb5e94705c7deaf47ce5ff8f5ea2e8cb47
-
SHA256
1681ed9e90a93d2bf51ea7b6407a03c43c61dafd65a5910da8f78c2c6883861c
-
SHA512
cffadaf877aeaf031a4fe46a536bbb6da93372a86f537dc1c93e4e5ded0dbc14a596efddbac8e049d3d545e6da19a922fefe37567e190554709f61b949fa0dff
-
SSDEEP
49152:+1aGQ+/WaoGV7qNqjUSN74NH5HUyNRcUsCVOzetdZJ:AaG3Oao67qQ4HBUCczzM3
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1420 085e6b6051db8c94c817b11991b9cdcc.exe -
Executes dropped EXE 1 IoCs
pid Process 1420 085e6b6051db8c94c817b11991b9cdcc.exe -
Loads dropped DLL 1 IoCs
pid Process 1696 085e6b6051db8c94c817b11991b9cdcc.exe -
resource yara_rule behavioral1/memory/1696-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/memory/1696-14-0x00000000037F0000-0x0000000003CDF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1696 085e6b6051db8c94c817b11991b9cdcc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1696 085e6b6051db8c94c817b11991b9cdcc.exe 1420 085e6b6051db8c94c817b11991b9cdcc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1420 1696 085e6b6051db8c94c817b11991b9cdcc.exe 15 PID 1696 wrote to memory of 1420 1696 085e6b6051db8c94c817b11991b9cdcc.exe 15 PID 1696 wrote to memory of 1420 1696 085e6b6051db8c94c817b11991b9cdcc.exe 15 PID 1696 wrote to memory of 1420 1696 085e6b6051db8c94c817b11991b9cdcc.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\085e6b6051db8c94c817b11991b9cdcc.exe"C:\Users\Admin\AppData\Local\Temp\085e6b6051db8c94c817b11991b9cdcc.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\085e6b6051db8c94c817b11991b9cdcc.exeC:\Users\Admin\AppData\Local\Temp\085e6b6051db8c94c817b11991b9cdcc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1420
-