Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:29
Behavioral task
behavioral1
Sample
247e45a604f8fcb487d9be64eeb5607e.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
247e45a604f8fcb487d9be64eeb5607e.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
247e45a604f8fcb487d9be64eeb5607e.exe
-
Size
1.5MB
-
MD5
247e45a604f8fcb487d9be64eeb5607e
-
SHA1
0aaec5d019d6d28a41cc50294cb8f075fa286960
-
SHA256
326ad12606f5da7658cd1a7f2b4c1e94ca1dbcd894aadb33ff127d9ca7981c47
-
SHA512
8e4740244ebfea3d31f7aea9d4187cda17b24e9cbc4cea26776f5172b63359e9912ec8e44a12f9e0e4aa4c369a135b5c0324d5c634a687e2a85191a286b59081
-
SSDEEP
24576:LzNrrq8sATudc5poJWZKXO6TTYVHCmqbC302KV3eBChBAahBW:Ll+8sAYc5pOWZKX7fJmr3DK1BAaD
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2860 247e45a604f8fcb487d9be64eeb5607e.exe -
Executes dropped EXE 1 IoCs
pid Process 2860 247e45a604f8fcb487d9be64eeb5607e.exe -
Loads dropped DLL 1 IoCs
pid Process 2216 247e45a604f8fcb487d9be64eeb5607e.exe -
resource yara_rule behavioral1/memory/2216-1-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2216 247e45a604f8fcb487d9be64eeb5607e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2216 247e45a604f8fcb487d9be64eeb5607e.exe 2860 247e45a604f8fcb487d9be64eeb5607e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2860 2216 247e45a604f8fcb487d9be64eeb5607e.exe 17 PID 2216 wrote to memory of 2860 2216 247e45a604f8fcb487d9be64eeb5607e.exe 17 PID 2216 wrote to memory of 2860 2216 247e45a604f8fcb487d9be64eeb5607e.exe 17 PID 2216 wrote to memory of 2860 2216 247e45a604f8fcb487d9be64eeb5607e.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\247e45a604f8fcb487d9be64eeb5607e.exe"C:\Users\Admin\AppData\Local\Temp\247e45a604f8fcb487d9be64eeb5607e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\247e45a604f8fcb487d9be64eeb5607e.exeC:\Users\Admin\AppData\Local\Temp\247e45a604f8fcb487d9be64eeb5607e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2860
-