Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:59
Behavioral task
behavioral1
Sample
292221779159599dc3e84bef0a9229bd.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
292221779159599dc3e84bef0a9229bd.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
292221779159599dc3e84bef0a9229bd.exe
-
Size
1.3MB
-
MD5
292221779159599dc3e84bef0a9229bd
-
SHA1
731491735af2977d3dbc40e5affe7b763651ab39
-
SHA256
5a70f986398dc907ed70361475510b7203728ec864a409f0c66ae41493c01641
-
SHA512
dd3a651a905a9ad9a9106d3afcf003bb984496baf96f1b975744838806fb797abed3cdf1c517a9af24f85f0d1a355d2bf17a23d7525a3b506e26eea881727fb9
-
SSDEEP
24576:VPcTYzUatQy36KtV9uZmXL7nOozr5Q8G4w/zvPc8nW4MzErl1nEPrjvG:NYa7rbL7OoHz0c8nWZY4D
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1912 292221779159599dc3e84bef0a9229bd.exe -
Executes dropped EXE 1 IoCs
pid Process 1912 292221779159599dc3e84bef0a9229bd.exe -
Loads dropped DLL 1 IoCs
pid Process 1704 292221779159599dc3e84bef0a9229bd.exe -
resource yara_rule behavioral1/memory/1704-0-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1704 292221779159599dc3e84bef0a9229bd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1704 292221779159599dc3e84bef0a9229bd.exe 1912 292221779159599dc3e84bef0a9229bd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1912 1704 292221779159599dc3e84bef0a9229bd.exe 17 PID 1704 wrote to memory of 1912 1704 292221779159599dc3e84bef0a9229bd.exe 17 PID 1704 wrote to memory of 1912 1704 292221779159599dc3e84bef0a9229bd.exe 17 PID 1704 wrote to memory of 1912 1704 292221779159599dc3e84bef0a9229bd.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\292221779159599dc3e84bef0a9229bd.exe"C:\Users\Admin\AppData\Local\Temp\292221779159599dc3e84bef0a9229bd.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\292221779159599dc3e84bef0a9229bd.exeC:\Users\Admin\AppData\Local\Temp\292221779159599dc3e84bef0a9229bd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1912
-