Analysis
-
max time kernel
1s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:12
Behavioral task
behavioral1
Sample
09af35ab1a01ea5bb24a49bca7e3a960.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
09af35ab1a01ea5bb24a49bca7e3a960.exe
Resource
win10v2004-20231222-en
7 signatures
150 seconds
General
-
Target
09af35ab1a01ea5bb24a49bca7e3a960.exe
-
Size
133KB
-
MD5
09af35ab1a01ea5bb24a49bca7e3a960
-
SHA1
63628167f166b59eb493049a1e63ae8e2e3c9d06
-
SHA256
1fb6138eda7a240c788ee09eb1160d64ab69698d428d65c0d70d75d6b11239bb
-
SHA512
637669adc8eebcd48914f9c079bce7ca2ad59c2f9373a97258b9a13647ea9a6db9ffa0041df19ffaf1994e1bf9f554255359cc6cb54d718089c530dfa5dbda25
-
SSDEEP
3072:CTQlPZs86PCkVw6z7EjQhuDAaJUwsxDeeb69MXkuq8Q:qUPOJCCgjQhuEamxyeeMXpq8Q
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2052 09af35ab1a01ea5bb24a49bca7e3a960.exe -
Executes dropped EXE 1 IoCs
pid Process 2052 09af35ab1a01ea5bb24a49bca7e3a960.exe -
Loads dropped DLL 1 IoCs
pid Process 2116 09af35ab1a01ea5bb24a49bca7e3a960.exe -
resource yara_rule behavioral1/memory/2116-0-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/memory/2116-15-0x00000000001C0000-0x0000000000246000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2116 09af35ab1a01ea5bb24a49bca7e3a960.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2116 09af35ab1a01ea5bb24a49bca7e3a960.exe 2052 09af35ab1a01ea5bb24a49bca7e3a960.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2052 2116 09af35ab1a01ea5bb24a49bca7e3a960.exe 16 PID 2116 wrote to memory of 2052 2116 09af35ab1a01ea5bb24a49bca7e3a960.exe 16 PID 2116 wrote to memory of 2052 2116 09af35ab1a01ea5bb24a49bca7e3a960.exe 16 PID 2116 wrote to memory of 2052 2116 09af35ab1a01ea5bb24a49bca7e3a960.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\09af35ab1a01ea5bb24a49bca7e3a960.exe"C:\Users\Admin\AppData\Local\Temp\09af35ab1a01ea5bb24a49bca7e3a960.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\09af35ab1a01ea5bb24a49bca7e3a960.exeC:\Users\Admin\AppData\Local\Temp\09af35ab1a01ea5bb24a49bca7e3a960.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2052
-