Analysis
-
max time kernel
4s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 01:15
Behavioral task
behavioral1
Sample
22aaf990a825808098a2cbc868d6330c.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
22aaf990a825808098a2cbc868d6330c.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
22aaf990a825808098a2cbc868d6330c.exe
-
Size
2.6MB
-
MD5
22aaf990a825808098a2cbc868d6330c
-
SHA1
1fe98eaea37ed810195e6480ab6a298a9c18f344
-
SHA256
4ee5e34833b569ac33cb003bbc6dd31e9717a3b36af1d5e8f64be382b35c3e83
-
SHA512
a274f87736d4a0506ab627d78df41d0460b7a935ac0b982ae596d06b071b33757062f447234bfc7c7bbc7078956d02474ee9f880f0950e16c4ee3a7802ee78fa
-
SSDEEP
49152:zguNU4sMA7HnBfyxth0HRak8F3z/2+Gzu6feay3:P4whVbL3
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2076 22aaf990a825808098a2cbc868d6330c.exe -
Executes dropped EXE 1 IoCs
pid Process 2076 22aaf990a825808098a2cbc868d6330c.exe -
Loads dropped DLL 1 IoCs
pid Process 1384 22aaf990a825808098a2cbc868d6330c.exe -
resource yara_rule behavioral1/memory/1384-0-0x0000000000400000-0x0000000000D9E000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1384 22aaf990a825808098a2cbc868d6330c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1384 22aaf990a825808098a2cbc868d6330c.exe 2076 22aaf990a825808098a2cbc868d6330c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1384 wrote to memory of 2076 1384 22aaf990a825808098a2cbc868d6330c.exe 15 PID 1384 wrote to memory of 2076 1384 22aaf990a825808098a2cbc868d6330c.exe 15 PID 1384 wrote to memory of 2076 1384 22aaf990a825808098a2cbc868d6330c.exe 15 PID 1384 wrote to memory of 2076 1384 22aaf990a825808098a2cbc868d6330c.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\22aaf990a825808098a2cbc868d6330c.exe"C:\Users\Admin\AppData\Local\Temp\22aaf990a825808098a2cbc868d6330c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\22aaf990a825808098a2cbc868d6330c.exeC:\Users\Admin\AppData\Local\Temp\22aaf990a825808098a2cbc868d6330c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2076
-