Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 04:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0e7ca6a1c9509e78a2bc374592170a01.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
0e7ca6a1c9509e78a2bc374592170a01.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
0e7ca6a1c9509e78a2bc374592170a01.exe
-
Size
385KB
-
MD5
0e7ca6a1c9509e78a2bc374592170a01
-
SHA1
f5311a9e03153a14267aa1228bd6032f8237a002
-
SHA256
9094e4d08943165b55feda98b58a39779ab0d6e3599ba0c7eeeaf9717382ee46
-
SHA512
a39f1a2a59b7eb5ba81f4b2c337ffc7945b27f0c9e774899b14a239a5053409e2c845ef6f94f666363ca097a4e1057f4791b9339e94682ab0381fe843b4bc376
-
SSDEEP
6144:oftfKTRsMo2S4lwpAViUsDVqtuEoF7bfhl1dj2dWnDDnolnGhNxfLHZfB:dVS4epAVWDkno1z1d6dqninGTxfLFB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2960 0e7ca6a1c9509e78a2bc374592170a01.exe -
Executes dropped EXE 1 IoCs
pid Process 2960 0e7ca6a1c9509e78a2bc374592170a01.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4920 0e7ca6a1c9509e78a2bc374592170a01.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4920 0e7ca6a1c9509e78a2bc374592170a01.exe 2960 0e7ca6a1c9509e78a2bc374592170a01.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4920 wrote to memory of 2960 4920 0e7ca6a1c9509e78a2bc374592170a01.exe 18 PID 4920 wrote to memory of 2960 4920 0e7ca6a1c9509e78a2bc374592170a01.exe 18 PID 4920 wrote to memory of 2960 4920 0e7ca6a1c9509e78a2bc374592170a01.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e7ca6a1c9509e78a2bc374592170a01.exe"C:\Users\Admin\AppData\Local\Temp\0e7ca6a1c9509e78a2bc374592170a01.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\0e7ca6a1c9509e78a2bc374592170a01.exeC:\Users\Admin\AppData\Local\Temp\0e7ca6a1c9509e78a2bc374592170a01.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2960
-