Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 10:05
Behavioral task
behavioral1
Sample
15547ae4b1e586715689105719900a49.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
15547ae4b1e586715689105719900a49.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
15547ae4b1e586715689105719900a49.exe
-
Size
1.3MB
-
MD5
15547ae4b1e586715689105719900a49
-
SHA1
1bf14cd1adb4492df5d12b21425e7ca42af1349c
-
SHA256
1a672c8877d2e1d44cce26adc046bebe9ed6bc1c8a7deeca0e071246de7312c2
-
SHA512
7eeb86645a704d80797f4767b06ad7209701587911d103377c8f72ddde7a67eab266387ec114f866d33d9fc95c74922cfb0d67048548e3c65dbc29168d89799b
-
SSDEEP
24576:w/KKAThpRsUTcKWjsua+2npPGZLaKWI3bKqp7evG:BVp+aWjQXuZeKWGz7
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2348 15547ae4b1e586715689105719900a49.exe -
Executes dropped EXE 1 IoCs
pid Process 2348 15547ae4b1e586715689105719900a49.exe -
Loads dropped DLL 1 IoCs
pid Process 2864 15547ae4b1e586715689105719900a49.exe -
resource yara_rule behavioral1/memory/2864-1-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2864 15547ae4b1e586715689105719900a49.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2864 15547ae4b1e586715689105719900a49.exe 2348 15547ae4b1e586715689105719900a49.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2348 2864 15547ae4b1e586715689105719900a49.exe 17 PID 2864 wrote to memory of 2348 2864 15547ae4b1e586715689105719900a49.exe 17 PID 2864 wrote to memory of 2348 2864 15547ae4b1e586715689105719900a49.exe 17 PID 2864 wrote to memory of 2348 2864 15547ae4b1e586715689105719900a49.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\15547ae4b1e586715689105719900a49.exe"C:\Users\Admin\AppData\Local\Temp\15547ae4b1e586715689105719900a49.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\15547ae4b1e586715689105719900a49.exeC:\Users\Admin\AppData\Local\Temp\15547ae4b1e586715689105719900a49.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2348
-