Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:41
Behavioral task
behavioral1
Sample
0ed5b569e1b126eb54b306aac1bfc53b.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
0ed5b569e1b126eb54b306aac1bfc53b.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
0ed5b569e1b126eb54b306aac1bfc53b.exe
-
Size
2.7MB
-
MD5
0ed5b569e1b126eb54b306aac1bfc53b
-
SHA1
1d2ad544c5b293393df781e686370547057e89cb
-
SHA256
3822879443d426175b1b1af3eac1681ef4aab78217a59c9b0ba41882082d4c75
-
SHA512
6c3181b45033b2ee600a69596bcd6d82b9fbd638604041494325a6866eeb3147e6921df7a72baa46c122dce5a860b9e21b6038ae209d8b44054ae962f22e7934
-
SSDEEP
49152:6AIMMRQ8/H4DAIZruRIg+5ZnojTfoLfdvVjjAiOCm/+cp22MR6AHf:m/RKDDsRq5ZnojexqDCm/+hXHf
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2800 0ed5b569e1b126eb54b306aac1bfc53b.exe -
Executes dropped EXE 1 IoCs
pid Process 2800 0ed5b569e1b126eb54b306aac1bfc53b.exe -
Loads dropped DLL 1 IoCs
pid Process 1736 0ed5b569e1b126eb54b306aac1bfc53b.exe -
resource yara_rule behavioral1/memory/1736-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1736 0ed5b569e1b126eb54b306aac1bfc53b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1736 0ed5b569e1b126eb54b306aac1bfc53b.exe 2800 0ed5b569e1b126eb54b306aac1bfc53b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2800 1736 0ed5b569e1b126eb54b306aac1bfc53b.exe 15 PID 1736 wrote to memory of 2800 1736 0ed5b569e1b126eb54b306aac1bfc53b.exe 15 PID 1736 wrote to memory of 2800 1736 0ed5b569e1b126eb54b306aac1bfc53b.exe 15 PID 1736 wrote to memory of 2800 1736 0ed5b569e1b126eb54b306aac1bfc53b.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ed5b569e1b126eb54b306aac1bfc53b.exe"C:\Users\Admin\AppData\Local\Temp\0ed5b569e1b126eb54b306aac1bfc53b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\0ed5b569e1b126eb54b306aac1bfc53b.exeC:\Users\Admin\AppData\Local\Temp\0ed5b569e1b126eb54b306aac1bfc53b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2800
-