Analysis
-
max time kernel
1s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:54
Behavioral task
behavioral1
Sample
25527b2bf2f6e7cb45f5ea117cc61aab.exe
Resource
win7-20231215-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
25527b2bf2f6e7cb45f5ea117cc61aab.exe
Resource
win10v2004-20231222-en
9 signatures
150 seconds
General
-
Target
25527b2bf2f6e7cb45f5ea117cc61aab.exe
-
Size
1.6MB
-
MD5
25527b2bf2f6e7cb45f5ea117cc61aab
-
SHA1
10e78ea185a6be8b30f3ea1a644e4e38e82e0337
-
SHA256
6635c9675504ad3c03edb50c9bb1b6683e2dd2409dce9cceef7177959ab32dc7
-
SHA512
1673da1018868472eac0834053e88f13ea1b03ee453e57439a9e9661178238efd9210c60f3c18b62aee613d846b933a591c0f99aea0284962ada80cb2eca70a5
-
SSDEEP
49152:tqjp7vUfl6iDEcakLz0iu36Ofl0Cv5lea9O0vMaJcakLz0O:tqjpY8OEcakcd36OfmCv5lea9O8bJcaw
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1904 25527b2bf2f6e7cb45f5ea117cc61aab.exe -
Executes dropped EXE 1 IoCs
pid Process 1904 25527b2bf2f6e7cb45f5ea117cc61aab.exe -
Loads dropped DLL 1 IoCs
pid Process 1048 25527b2bf2f6e7cb45f5ea117cc61aab.exe -
resource yara_rule behavioral1/files/0x000d000000012246-11.dat upx behavioral1/memory/1048-0-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2856 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1048 25527b2bf2f6e7cb45f5ea117cc61aab.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1048 25527b2bf2f6e7cb45f5ea117cc61aab.exe 1904 25527b2bf2f6e7cb45f5ea117cc61aab.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1904 1048 25527b2bf2f6e7cb45f5ea117cc61aab.exe 22 PID 1048 wrote to memory of 1904 1048 25527b2bf2f6e7cb45f5ea117cc61aab.exe 22 PID 1048 wrote to memory of 1904 1048 25527b2bf2f6e7cb45f5ea117cc61aab.exe 22 PID 1048 wrote to memory of 1904 1048 25527b2bf2f6e7cb45f5ea117cc61aab.exe 22 PID 1904 wrote to memory of 2856 1904 25527b2bf2f6e7cb45f5ea117cc61aab.exe 18 PID 1904 wrote to memory of 2856 1904 25527b2bf2f6e7cb45f5ea117cc61aab.exe 18 PID 1904 wrote to memory of 2856 1904 25527b2bf2f6e7cb45f5ea117cc61aab.exe 18 PID 1904 wrote to memory of 2856 1904 25527b2bf2f6e7cb45f5ea117cc61aab.exe 18 PID 1904 wrote to memory of 2772 1904 25527b2bf2f6e7cb45f5ea117cc61aab.exe 21 PID 1904 wrote to memory of 2772 1904 25527b2bf2f6e7cb45f5ea117cc61aab.exe 21 PID 1904 wrote to memory of 2772 1904 25527b2bf2f6e7cb45f5ea117cc61aab.exe 21 PID 1904 wrote to memory of 2772 1904 25527b2bf2f6e7cb45f5ea117cc61aab.exe 21 PID 2772 wrote to memory of 2168 2772 cmd.exe 20 PID 2772 wrote to memory of 2168 2772 cmd.exe 20 PID 2772 wrote to memory of 2168 2772 cmd.exe 20 PID 2772 wrote to memory of 2168 2772 cmd.exe 20
Processes
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\25527b2bf2f6e7cb45f5ea117cc61aab.exe" /TN QxutJGth3fd4 /F1⤵
- Creates scheduled task(s)
PID:2856
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN QxutJGth3fd41⤵PID:2168
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN QxutJGth3fd4 > C:\Users\Admin\AppData\Local\Temp\PORw8OC1e.xml1⤵
- Suspicious use of WriteProcessMemory
PID:2772
-
C:\Users\Admin\AppData\Local\Temp\25527b2bf2f6e7cb45f5ea117cc61aab.exeC:\Users\Admin\AppData\Local\Temp\25527b2bf2f6e7cb45f5ea117cc61aab.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1904
-
C:\Users\Admin\AppData\Local\Temp\25527b2bf2f6e7cb45f5ea117cc61aab.exe"C:\Users\Admin\AppData\Local\Temp\25527b2bf2f6e7cb45f5ea117cc61aab.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1048