Analysis
-
max time kernel
5s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 05:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2ace1ee66520ff285f004cbb0d7ae6af.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2ace1ee66520ff285f004cbb0d7ae6af.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
2ace1ee66520ff285f004cbb0d7ae6af.exe
-
Size
907KB
-
MD5
2ace1ee66520ff285f004cbb0d7ae6af
-
SHA1
e4416b5a8efdc89309be44061c1e286a1820cba8
-
SHA256
12951d83aa4309a174cb4d2dae3cfacca7df3df054985730e2a98a880d423574
-
SHA512
04a59d27022abeba5df3956113ac1810b1b605e3bee65638cd99dc6cafaadcbae8f7c445c17f7739a10b306452c87b5d5ee34d145a414ef64d09b358d036176c
-
SSDEEP
12288:TOifJzscubzVjaDfCPg5oL4bi2iXVH9tp1VEjfRepFdhdG+in+X+eF2jVDa/ZS1:TO8zVUVeDfsIUPH7zeeN2+gGF0a/ZS1
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2356 2ace1ee66520ff285f004cbb0d7ae6af.exe -
Executes dropped EXE 1 IoCs
pid Process 2356 2ace1ee66520ff285f004cbb0d7ae6af.exe -
Loads dropped DLL 1 IoCs
pid Process 2176 2ace1ee66520ff285f004cbb0d7ae6af.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2176 2ace1ee66520ff285f004cbb0d7ae6af.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2176 2ace1ee66520ff285f004cbb0d7ae6af.exe 2356 2ace1ee66520ff285f004cbb0d7ae6af.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2356 2176 2ace1ee66520ff285f004cbb0d7ae6af.exe 19 PID 2176 wrote to memory of 2356 2176 2ace1ee66520ff285f004cbb0d7ae6af.exe 19 PID 2176 wrote to memory of 2356 2176 2ace1ee66520ff285f004cbb0d7ae6af.exe 19 PID 2176 wrote to memory of 2356 2176 2ace1ee66520ff285f004cbb0d7ae6af.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ace1ee66520ff285f004cbb0d7ae6af.exe"C:\Users\Admin\AppData\Local\Temp\2ace1ee66520ff285f004cbb0d7ae6af.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\2ace1ee66520ff285f004cbb0d7ae6af.exeC:\Users\Admin\AppData\Local\Temp\2ace1ee66520ff285f004cbb0d7ae6af.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2356
-