Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
269b82a859c4d46ee152d1c14a44b187.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
269b82a859c4d46ee152d1c14a44b187.exe
Resource
win10v2004-20231222-en
5 signatures
150 seconds
General
-
Target
269b82a859c4d46ee152d1c14a44b187.exe
-
Size
81KB
-
MD5
269b82a859c4d46ee152d1c14a44b187
-
SHA1
2ac1ebdb4a6b7b9ff4123b5fed3ec346385888c6
-
SHA256
1fcaf4fc1a94c766de648efae3f3d0ed40ff60e54fd0d8dbd19e46bcad60d014
-
SHA512
8d737ec612d9434a37e02e4f9de2be486ec1e703910c0717fe9c634a5337e060e66ac291d7bd1708ac1ad1dabcbc3713457cd3217c83b3cdfc20a47059940b69
-
SSDEEP
1536:dpAkrReK7tCNRNurVgfFPEYPsttXXibDNMA31VyquCnJv07:dpA84I4N82NEY0HXmDaAFVcCJv07
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2712 269b82a859c4d46ee152d1c14a44b187.exe -
Executes dropped EXE 1 IoCs
pid Process 2712 269b82a859c4d46ee152d1c14a44b187.exe -
Loads dropped DLL 1 IoCs
pid Process 1244 269b82a859c4d46ee152d1c14a44b187.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1244 269b82a859c4d46ee152d1c14a44b187.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1244 269b82a859c4d46ee152d1c14a44b187.exe 2712 269b82a859c4d46ee152d1c14a44b187.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2712 1244 269b82a859c4d46ee152d1c14a44b187.exe 16 PID 1244 wrote to memory of 2712 1244 269b82a859c4d46ee152d1c14a44b187.exe 16 PID 1244 wrote to memory of 2712 1244 269b82a859c4d46ee152d1c14a44b187.exe 16 PID 1244 wrote to memory of 2712 1244 269b82a859c4d46ee152d1c14a44b187.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\269b82a859c4d46ee152d1c14a44b187.exeC:\Users\Admin\AppData\Local\Temp\269b82a859c4d46ee152d1c14a44b187.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2712
-
C:\Users\Admin\AppData\Local\Temp\269b82a859c4d46ee152d1c14a44b187.exe"C:\Users\Admin\AppData\Local\Temp\269b82a859c4d46ee152d1c14a44b187.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1244