Analysis
-
max time kernel
1s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 07:08
Behavioral task
behavioral1
Sample
11c4d629a662ed9de5f754206a1aab20.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
11c4d629a662ed9de5f754206a1aab20.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
11c4d629a662ed9de5f754206a1aab20.exe
-
Size
2.6MB
-
MD5
11c4d629a662ed9de5f754206a1aab20
-
SHA1
aa89f3a31019b4433ecc0ded2b7cc0b0bfce15bf
-
SHA256
39f70cadf72e03c42978e98229e9ecb6b70eaaff05f699665453a6b681b198e5
-
SHA512
73c3a798124b2aaf6588a248a6dda2425c8c729ee30b213c7278788acc487a86dffcc26e39aec48a5a8b3e9cbda52e71f62215bc123531d6d6d260a48c58c747
-
SSDEEP
49152:t//2OdejW+suPMCqCOwK6mCvXH6M6pIK2vzc3T/ay3:tX1/+FoVIM373
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2240 11c4d629a662ed9de5f754206a1aab20.exe -
Executes dropped EXE 1 IoCs
pid Process 2240 11c4d629a662ed9de5f754206a1aab20.exe -
Loads dropped DLL 1 IoCs
pid Process 2512 11c4d629a662ed9de5f754206a1aab20.exe -
resource yara_rule behavioral1/memory/2512-0-0x0000000000400000-0x0000000000D9E000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2512 11c4d629a662ed9de5f754206a1aab20.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2512 11c4d629a662ed9de5f754206a1aab20.exe 2240 11c4d629a662ed9de5f754206a1aab20.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2240 2512 11c4d629a662ed9de5f754206a1aab20.exe 18 PID 2512 wrote to memory of 2240 2512 11c4d629a662ed9de5f754206a1aab20.exe 18 PID 2512 wrote to memory of 2240 2512 11c4d629a662ed9de5f754206a1aab20.exe 18 PID 2512 wrote to memory of 2240 2512 11c4d629a662ed9de5f754206a1aab20.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\11c4d629a662ed9de5f754206a1aab20.exe"C:\Users\Admin\AppData\Local\Temp\11c4d629a662ed9de5f754206a1aab20.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\11c4d629a662ed9de5f754206a1aab20.exeC:\Users\Admin\AppData\Local\Temp\11c4d629a662ed9de5f754206a1aab20.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2240
-