Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 04:50
Behavioral task
behavioral1
Sample
0f0ff38cb163632603dd1e15514a5610.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
0f0ff38cb163632603dd1e15514a5610.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
0f0ff38cb163632603dd1e15514a5610.exe
-
Size
1.5MB
-
MD5
0f0ff38cb163632603dd1e15514a5610
-
SHA1
23652411a11f366f62f1cb229b7b05ee9383c724
-
SHA256
0a62db95264abf035e276a3cf3cf30969456543c39caf43367bb79c8045f45fa
-
SHA512
f589a772683683e948bf29f88262ca4f33ca8379eca5b647ee2171582c81d8504475ba2fe92ad14356fc0b16397cc44a5b3e7e2d5293c36d767275cdf236e39c
-
SSDEEP
24576:eNnxuTG7ei8wOlna3Jt3zV0vErfc+j/C8+K7l5/TbRYhE7W:+xuTGyqO8zSvifcIDv55H
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2344 0f0ff38cb163632603dd1e15514a5610.exe -
Executes dropped EXE 1 IoCs
pid Process 2344 0f0ff38cb163632603dd1e15514a5610.exe -
Loads dropped DLL 1 IoCs
pid Process 2192 0f0ff38cb163632603dd1e15514a5610.exe -
resource yara_rule behavioral1/memory/2192-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/memory/2192-14-0x0000000003610000-0x0000000003AFF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2192 0f0ff38cb163632603dd1e15514a5610.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2192 0f0ff38cb163632603dd1e15514a5610.exe 2344 0f0ff38cb163632603dd1e15514a5610.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2344 2192 0f0ff38cb163632603dd1e15514a5610.exe 17 PID 2192 wrote to memory of 2344 2192 0f0ff38cb163632603dd1e15514a5610.exe 17 PID 2192 wrote to memory of 2344 2192 0f0ff38cb163632603dd1e15514a5610.exe 17 PID 2192 wrote to memory of 2344 2192 0f0ff38cb163632603dd1e15514a5610.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f0ff38cb163632603dd1e15514a5610.exe"C:\Users\Admin\AppData\Local\Temp\0f0ff38cb163632603dd1e15514a5610.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\0f0ff38cb163632603dd1e15514a5610.exeC:\Users\Admin\AppData\Local\Temp\0f0ff38cb163632603dd1e15514a5610.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2344
-