Analysis
-
max time kernel
3s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:14
Behavioral task
behavioral1
Sample
0b4dc6848772df8ca11f08d2ba5ed057.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
0b4dc6848772df8ca11f08d2ba5ed057.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
0b4dc6848772df8ca11f08d2ba5ed057.exe
-
Size
5.5MB
-
MD5
0b4dc6848772df8ca11f08d2ba5ed057
-
SHA1
f6e6817e731341ae261fa33d44ed3e2f0ee46e1f
-
SHA256
a28e4a18806173fe6cd65e6eb425f5ce6308c469e4a48522f8698dcb67713504
-
SHA512
c66dc49d5f7681a04fa6a5b1d86cb38bde126e1b6545d540fdb34943ad3fa94552c5f5e74dd5c4f57816604b448bc70948fa74c7a8911bf2632805b855a8b4a3
-
SSDEEP
49152:M9WHPn9YNDQo4xEYjPvpGKEc8HFBM2NBZMBlIl9ozTgcay3vRmCFOGNj8mW4JH5I:lHPtBjHpOHQR0kP35mCckFR+vicS43
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2032 0b4dc6848772df8ca11f08d2ba5ed057.exe -
Executes dropped EXE 1 IoCs
pid Process 2032 0b4dc6848772df8ca11f08d2ba5ed057.exe -
Loads dropped DLL 1 IoCs
pid Process 2852 0b4dc6848772df8ca11f08d2ba5ed057.exe -
resource yara_rule behavioral1/memory/2852-2-0x0000000000400000-0x0000000000D9E000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2852 0b4dc6848772df8ca11f08d2ba5ed057.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2852 0b4dc6848772df8ca11f08d2ba5ed057.exe 2032 0b4dc6848772df8ca11f08d2ba5ed057.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2032 2852 0b4dc6848772df8ca11f08d2ba5ed057.exe 18 PID 2852 wrote to memory of 2032 2852 0b4dc6848772df8ca11f08d2ba5ed057.exe 18 PID 2852 wrote to memory of 2032 2852 0b4dc6848772df8ca11f08d2ba5ed057.exe 18 PID 2852 wrote to memory of 2032 2852 0b4dc6848772df8ca11f08d2ba5ed057.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b4dc6848772df8ca11f08d2ba5ed057.exe"C:\Users\Admin\AppData\Local\Temp\0b4dc6848772df8ca11f08d2ba5ed057.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\0b4dc6848772df8ca11f08d2ba5ed057.exeC:\Users\Admin\AppData\Local\Temp\0b4dc6848772df8ca11f08d2ba5ed057.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2032
-