Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
09b73b5e8ef2fd95dd5ed4421b780638.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
09b73b5e8ef2fd95dd5ed4421b780638.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
09b73b5e8ef2fd95dd5ed4421b780638.exe
-
Size
1.9MB
-
MD5
09b73b5e8ef2fd95dd5ed4421b780638
-
SHA1
1d89796eb5eff464161a40d059b33603acd87dc4
-
SHA256
6f9ba1f911ce6dde6b1a246ce426c497256dac4914f3415b55d1e6d8d023fbc2
-
SHA512
b67faf1e559876aaf09e4f5589754ab6b1ac7558c3b2f71f31cc8802d303cbf7e3c659e63cf6e0bb3930f512fec8bace8cd5c21e3a99b6e21f8c2e236a10f0a0
-
SSDEEP
49152:Qoa1taC070dQjOw0Ka/JLuMVeRlk+mjBsICirwiHnlGbL5h:Qoa1taC07j0BAMVeRlk+mjOICi0Onlih
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2520 1758.tmp -
Executes dropped EXE 1 IoCs
pid Process 2520 1758.tmp -
Loads dropped DLL 1 IoCs
pid Process 2012 09b73b5e8ef2fd95dd5ed4421b780638.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2520 2012 09b73b5e8ef2fd95dd5ed4421b780638.exe 28 PID 2012 wrote to memory of 2520 2012 09b73b5e8ef2fd95dd5ed4421b780638.exe 28 PID 2012 wrote to memory of 2520 2012 09b73b5e8ef2fd95dd5ed4421b780638.exe 28 PID 2012 wrote to memory of 2520 2012 09b73b5e8ef2fd95dd5ed4421b780638.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\09b73b5e8ef2fd95dd5ed4421b780638.exe"C:\Users\Admin\AppData\Local\Temp\09b73b5e8ef2fd95dd5ed4421b780638.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\1758.tmp"C:\Users\Admin\AppData\Local\Temp\1758.tmp" --splashC:\Users\Admin\AppData\Local\Temp\09b73b5e8ef2fd95dd5ed4421b780638.exe E8F36D20A677E2C1C8C7A8E9C0649130408ACC08073C46904733F303519497A1454BACC311F3D52F30824F691E2ACEE66ABCDB740EAB96E0A85925FC7DE2DBFF2⤵
- Deletes itself
- Executes dropped EXE
PID:2520
-