Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
279d1f78e7a46c73fa7cc468cf341356.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
279d1f78e7a46c73fa7cc468cf341356.exe
Resource
win10v2004-20231222-en
5 signatures
150 seconds
General
-
Target
279d1f78e7a46c73fa7cc468cf341356.exe
-
Size
81KB
-
MD5
279d1f78e7a46c73fa7cc468cf341356
-
SHA1
96e0576a26b1cb2a1c580447be07af488d0d2678
-
SHA256
0a2652cff20ef36c7e0110f5bc4d66ee282621b6dd7fba5f1e9dcbcd37eb1ae9
-
SHA512
8f599780abf5f4721b764fe1693c2a3bb2a9aec7f835d943671ca2952fa3d5bee506967e1080b4d954f9054c903506593e6e243426a02ee7a1dc0cade96182d2
-
SSDEEP
1536:n53YXo/jKnKVtJykjv+M8wcb7JaSQzeK3wRcL3Hy7qq:pY4nVtpt8wq7cSeeK3wmy7qq
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3044 279d1f78e7a46c73fa7cc468cf341356.exe -
Executes dropped EXE 1 IoCs
pid Process 3044 279d1f78e7a46c73fa7cc468cf341356.exe -
Loads dropped DLL 1 IoCs
pid Process 1852 279d1f78e7a46c73fa7cc468cf341356.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1852 279d1f78e7a46c73fa7cc468cf341356.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1852 279d1f78e7a46c73fa7cc468cf341356.exe 3044 279d1f78e7a46c73fa7cc468cf341356.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1852 wrote to memory of 3044 1852 279d1f78e7a46c73fa7cc468cf341356.exe 17 PID 1852 wrote to memory of 3044 1852 279d1f78e7a46c73fa7cc468cf341356.exe 17 PID 1852 wrote to memory of 3044 1852 279d1f78e7a46c73fa7cc468cf341356.exe 17 PID 1852 wrote to memory of 3044 1852 279d1f78e7a46c73fa7cc468cf341356.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\279d1f78e7a46c73fa7cc468cf341356.exeC:\Users\Admin\AppData\Local\Temp\279d1f78e7a46c73fa7cc468cf341356.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3044
-
C:\Users\Admin\AppData\Local\Temp\279d1f78e7a46c73fa7cc468cf341356.exe"C:\Users\Admin\AppData\Local\Temp\279d1f78e7a46c73fa7cc468cf341356.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1852