Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0ab995271f040c736298f9e39ca48eb5.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
0ab995271f040c736298f9e39ca48eb5.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
0ab995271f040c736298f9e39ca48eb5.exe
-
Size
1.9MB
-
MD5
0ab995271f040c736298f9e39ca48eb5
-
SHA1
3a4ca4d6baf59b88830c600d7a32a7db9a3d404d
-
SHA256
72f1286369ee8b72b00dc6e4b5d55ee8f5062455485499c96f035b3e22ddc370
-
SHA512
4c021b6cb3b72661f32ebc0603077ae7deffbcf3a92e3d8af5a153a860c34b91c2b1219290507af5401b4a47c34b05246659e62667a60bb44b92f68324e783b6
-
SSDEEP
49152:Qoa1taC070d+U7f6PvjLaJJsRvM1uqCj2N6o:Qoa1taC0BU7CH3aERE1RCj2Yo
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3060 1BDA.tmp -
Executes dropped EXE 1 IoCs
pid Process 3060 1BDA.tmp -
Loads dropped DLL 1 IoCs
pid Process 2184 0ab995271f040c736298f9e39ca48eb5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 3060 2184 0ab995271f040c736298f9e39ca48eb5.exe 28 PID 2184 wrote to memory of 3060 2184 0ab995271f040c736298f9e39ca48eb5.exe 28 PID 2184 wrote to memory of 3060 2184 0ab995271f040c736298f9e39ca48eb5.exe 28 PID 2184 wrote to memory of 3060 2184 0ab995271f040c736298f9e39ca48eb5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ab995271f040c736298f9e39ca48eb5.exe"C:\Users\Admin\AppData\Local\Temp\0ab995271f040c736298f9e39ca48eb5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\1BDA.tmp"C:\Users\Admin\AppData\Local\Temp\1BDA.tmp" --splashC:\Users\Admin\AppData\Local\Temp\0ab995271f040c736298f9e39ca48eb5.exe F38CB10B09EB0511401D10FDF50E2C8DCCB108CBB12184EB987F90133EAF036E696C40DE720ACD31356857608A28647B5A75EB7B1F61DE5BC3D6F2FA63CBB6112⤵
- Deletes itself
- Executes dropped EXE
PID:3060
-