Analysis
-
max time kernel
1s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0b5e27fe9f22c1909ccdf12348297d31.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
0b5e27fe9f22c1909ccdf12348297d31.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
0b5e27fe9f22c1909ccdf12348297d31.exe
-
Size
385KB
-
MD5
0b5e27fe9f22c1909ccdf12348297d31
-
SHA1
c90e8157bb4bb5ac9f6dd289c067166371f36246
-
SHA256
c6663bed68eed8135590831ad7ada1d4242a646abb812ddbf1cee20c2d3dcfd8
-
SHA512
203d8e05a08f8ff34ae592a58d4d02b5864dea1b31f88df5138cccd68fd70721bad8d469afcdd512d1bc5ba7675204ce1c515fc189443a46d97f9111ac28baf8
-
SSDEEP
6144:vZO9l0LrUhvj9edUhe996hkDIyxeqgcehmbp9DzfnX8mMHSs9vBHg49zJb5b5GBG:Mta/IyY7gbp9Djsms9NbN5ch2jFB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2968 0b5e27fe9f22c1909ccdf12348297d31.exe -
Executes dropped EXE 1 IoCs
pid Process 2968 0b5e27fe9f22c1909ccdf12348297d31.exe -
Loads dropped DLL 1 IoCs
pid Process 2316 0b5e27fe9f22c1909ccdf12348297d31.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2316 0b5e27fe9f22c1909ccdf12348297d31.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2316 0b5e27fe9f22c1909ccdf12348297d31.exe 2968 0b5e27fe9f22c1909ccdf12348297d31.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2968 2316 0b5e27fe9f22c1909ccdf12348297d31.exe 14 PID 2316 wrote to memory of 2968 2316 0b5e27fe9f22c1909ccdf12348297d31.exe 14 PID 2316 wrote to memory of 2968 2316 0b5e27fe9f22c1909ccdf12348297d31.exe 14 PID 2316 wrote to memory of 2968 2316 0b5e27fe9f22c1909ccdf12348297d31.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b5e27fe9f22c1909ccdf12348297d31.exeC:\Users\Admin\AppData\Local\Temp\0b5e27fe9f22c1909ccdf12348297d31.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2968
-
C:\Users\Admin\AppData\Local\Temp\0b5e27fe9f22c1909ccdf12348297d31.exe"C:\Users\Admin\AppData\Local\Temp\0b5e27fe9f22c1909ccdf12348297d31.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2316