Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 01:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
23571cb495a12b8e285f47987534b708.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
23571cb495a12b8e285f47987534b708.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
23571cb495a12b8e285f47987534b708.exe
-
Size
47KB
-
MD5
23571cb495a12b8e285f47987534b708
-
SHA1
d94b91741bdcadfa4c9aaebcc39b952a49dbe99a
-
SHA256
9038dd05993b2418c6c722412aaa7baf0394a652e797960dc5f1319d48b3e42a
-
SHA512
d2947fb40bbd4ef753f1ab951e29cc6babc452fc4a43294d9d2ca11ee3cbf6b3f28321a995ae435a529f1258d198ea49fcb2e72b7078e9337a08cb9d39fcd5e6
-
SSDEEP
768:svgRbOujaRI6RbO8ZtcH0nJ4FABDEs7s2LUGYNIbbV6GPYQ6ka/ElMvE/dL:h3aps9CJ4CEsS/NMoGf6kLeE5
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1380 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1752 nkfahmvq.exe -
Loads dropped DLL 2 IoCs
pid Process 1924 23571cb495a12b8e285f47987534b708.exe 1924 23571cb495a12b8e285f47987534b708.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1924 23571cb495a12b8e285f47987534b708.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1752 1924 23571cb495a12b8e285f47987534b708.exe 33 PID 1924 wrote to memory of 1752 1924 23571cb495a12b8e285f47987534b708.exe 33 PID 1924 wrote to memory of 1752 1924 23571cb495a12b8e285f47987534b708.exe 33 PID 1924 wrote to memory of 1752 1924 23571cb495a12b8e285f47987534b708.exe 33 PID 1924 wrote to memory of 1380 1924 23571cb495a12b8e285f47987534b708.exe 32 PID 1924 wrote to memory of 1380 1924 23571cb495a12b8e285f47987534b708.exe 32 PID 1924 wrote to memory of 1380 1924 23571cb495a12b8e285f47987534b708.exe 32 PID 1924 wrote to memory of 1380 1924 23571cb495a12b8e285f47987534b708.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\23571cb495a12b8e285f47987534b708.exe"C:\Users\Admin\AppData\Local\Temp\23571cb495a12b8e285f47987534b708.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\23571C~1.EXE.bak >> NUL2⤵
- Deletes itself
PID:1380
-
-
C:\ProgramData\vidqrkpq\nkfahmvq.exeC:\ProgramData\vidqrkpq\nkfahmvq.exe2⤵
- Executes dropped EXE
PID:1752
-