Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 03:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
26f73c2640d87829dd50dc2bcf0b8895.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
26f73c2640d87829dd50dc2bcf0b8895.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
26f73c2640d87829dd50dc2bcf0b8895.exe
-
Size
1.9MB
-
MD5
26f73c2640d87829dd50dc2bcf0b8895
-
SHA1
102171d517164e36cd76e5b2cedfdac109b1f48b
-
SHA256
864312702677789cd96d93dc9d1cd3a558d9f2c08e9b55030a8cfe987c1050f4
-
SHA512
14ada5ba81fd9b371a5ddfb2951fecd0be7da85a62e35b79b7ca0f8414ad999ee933ef9faeb0285eb5c962e327952bc92681ece2c24144ae0fa532df99e4da5e
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10dEfuPTPQ58oMRuuZli5/KhlTrf9W61F6+L0Hc:Qoa1taC070d1myR+pK71//pPVRkotp9
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2520 E53.tmp -
Executes dropped EXE 1 IoCs
pid Process 2520 E53.tmp -
Loads dropped DLL 1 IoCs
pid Process 1940 26f73c2640d87829dd50dc2bcf0b8895.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2520 1940 26f73c2640d87829dd50dc2bcf0b8895.exe 28 PID 1940 wrote to memory of 2520 1940 26f73c2640d87829dd50dc2bcf0b8895.exe 28 PID 1940 wrote to memory of 2520 1940 26f73c2640d87829dd50dc2bcf0b8895.exe 28 PID 1940 wrote to memory of 2520 1940 26f73c2640d87829dd50dc2bcf0b8895.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\26f73c2640d87829dd50dc2bcf0b8895.exe"C:\Users\Admin\AppData\Local\Temp\26f73c2640d87829dd50dc2bcf0b8895.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\E53.tmp"C:\Users\Admin\AppData\Local\Temp\E53.tmp" --splashC:\Users\Admin\AppData\Local\Temp\26f73c2640d87829dd50dc2bcf0b8895.exe 4210F980895FA415ED8F71EC0CC0DC0F66D42D7707BDEA584A35CBA4D5C121953373FCED0790030C0C7EC799ABC377883372E63481DDC55C700EA2184A721B5D2⤵
- Deletes itself
- Executes dropped EXE
PID:2520
-