Analysis
-
max time kernel
121s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 10:01
Behavioral task
behavioral1
Sample
153ab098e29844e397609b81b3e9fc04.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
153ab098e29844e397609b81b3e9fc04.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
153ab098e29844e397609b81b3e9fc04.exe
-
Size
1.5MB
-
MD5
153ab098e29844e397609b81b3e9fc04
-
SHA1
ec653b383a365a6b83d79b0c0385a8ef28502a84
-
SHA256
33f20dfe483ec72a0e96863106b41198c703699e59cd328e396677d10da23e57
-
SHA512
dd802c234ed7709ba22ba53c26556aab558b6bc3f6e8217d3e98aa8994826f26ab8b8a38d215fe3e4c97a8cf4ecfcf38583e92615a1c763f7199add9b83d1592
-
SSDEEP
24576:2nwHf23OfJIqoW5rxIL+TXf/24faZT+5Z4Va5jINthlW:g6ffJlPzRP4kpcnl
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2204 153ab098e29844e397609b81b3e9fc04.exe -
Executes dropped EXE 1 IoCs
pid Process 2204 153ab098e29844e397609b81b3e9fc04.exe -
Loads dropped DLL 1 IoCs
pid Process 1260 153ab098e29844e397609b81b3e9fc04.exe -
resource yara_rule behavioral1/memory/1260-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/memory/1260-15-0x00000000035C0000-0x0000000003AAF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1260 153ab098e29844e397609b81b3e9fc04.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1260 153ab098e29844e397609b81b3e9fc04.exe 2204 153ab098e29844e397609b81b3e9fc04.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2204 1260 153ab098e29844e397609b81b3e9fc04.exe 18 PID 1260 wrote to memory of 2204 1260 153ab098e29844e397609b81b3e9fc04.exe 18 PID 1260 wrote to memory of 2204 1260 153ab098e29844e397609b81b3e9fc04.exe 18 PID 1260 wrote to memory of 2204 1260 153ab098e29844e397609b81b3e9fc04.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\153ab098e29844e397609b81b3e9fc04.exe"C:\Users\Admin\AppData\Local\Temp\153ab098e29844e397609b81b3e9fc04.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\153ab098e29844e397609b81b3e9fc04.exeC:\Users\Admin\AppData\Local\Temp\153ab098e29844e397609b81b3e9fc04.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2204
-