Analysis
-
max time kernel
3s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 01:52
Behavioral task
behavioral1
Sample
237499cbd27a10ac0943571bd560090a.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
237499cbd27a10ac0943571bd560090a.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
237499cbd27a10ac0943571bd560090a.exe
-
Size
133KB
-
MD5
237499cbd27a10ac0943571bd560090a
-
SHA1
ca57b7ff8046354444169f0830ed72871e6f34e4
-
SHA256
ac73f5c34dd4fd287808eeca9e4fcb00758ddcea203543823b64dc0975b90967
-
SHA512
521816f6f0cb9346158c9e8c5fb0adffd1563afeddbe0183178a1d6ea2de1e88184d8fa036fbb4ba5aea5f6c66e21252160911188ddf2ad092f2904f77afb3ba
-
SSDEEP
3072:tji4QXYbssjabFAhdo/07bRz2SapVbEzSY3Yi9wcrbQ:tjinXgSA1RKJFE6+bQ
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2964 237499cbd27a10ac0943571bd560090a.exe -
Executes dropped EXE 1 IoCs
pid Process 2964 237499cbd27a10ac0943571bd560090a.exe -
Loads dropped DLL 1 IoCs
pid Process 2236 237499cbd27a10ac0943571bd560090a.exe -
resource yara_rule behavioral1/files/0x000c00000001232d-11.dat upx behavioral1/memory/2236-0-0x0000000000400000-0x0000000000486000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2236 237499cbd27a10ac0943571bd560090a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2236 237499cbd27a10ac0943571bd560090a.exe 2964 237499cbd27a10ac0943571bd560090a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2964 2236 237499cbd27a10ac0943571bd560090a.exe 15 PID 2236 wrote to memory of 2964 2236 237499cbd27a10ac0943571bd560090a.exe 15 PID 2236 wrote to memory of 2964 2236 237499cbd27a10ac0943571bd560090a.exe 15 PID 2236 wrote to memory of 2964 2236 237499cbd27a10ac0943571bd560090a.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\237499cbd27a10ac0943571bd560090a.exeC:\Users\Admin\AppData\Local\Temp\237499cbd27a10ac0943571bd560090a.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2964
-
C:\Users\Admin\AppData\Local\Temp\237499cbd27a10ac0943571bd560090a.exe"C:\Users\Admin\AppData\Local\Temp\237499cbd27a10ac0943571bd560090a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2236