Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:50
Behavioral task
behavioral1
Sample
38b2eca13553190ac120dfc15b341aab.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
38b2eca13553190ac120dfc15b341aab.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
38b2eca13553190ac120dfc15b341aab.exe
-
Size
1.5MB
-
MD5
38b2eca13553190ac120dfc15b341aab
-
SHA1
9ce646efb4921c96017d1aca50a4294d3efa4297
-
SHA256
05f3c61c8ef01eec11c70e772bdcce7079cb2ae7aada9ebdcbf73f9505022626
-
SHA512
d2387e7424da2118f4f3b28f40836cba43f2f542b9a520fddf757b51a8ee7b7c4e81785a70cc486e16c8000a48b7f6b68271904534ca1f64f1dba945b7beba2b
-
SSDEEP
24576:fLLa8po5D2eP4tAZze7RkuOPQi+C3X5VN7x30FlbxN9aHvLMk5CJAfCloBDwW:/M5D2KZgkuOIE5VUPYgk5CgC4Dw
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2900 38b2eca13553190ac120dfc15b341aab.exe -
Executes dropped EXE 1 IoCs
pid Process 2900 38b2eca13553190ac120dfc15b341aab.exe -
Loads dropped DLL 1 IoCs
pid Process 1672 38b2eca13553190ac120dfc15b341aab.exe -
resource yara_rule behavioral1/memory/2900-17-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x0009000000014395-10.dat upx behavioral1/memory/1672-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1672 38b2eca13553190ac120dfc15b341aab.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1672 38b2eca13553190ac120dfc15b341aab.exe 2900 38b2eca13553190ac120dfc15b341aab.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2900 1672 38b2eca13553190ac120dfc15b341aab.exe 18 PID 1672 wrote to memory of 2900 1672 38b2eca13553190ac120dfc15b341aab.exe 18 PID 1672 wrote to memory of 2900 1672 38b2eca13553190ac120dfc15b341aab.exe 18 PID 1672 wrote to memory of 2900 1672 38b2eca13553190ac120dfc15b341aab.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\38b2eca13553190ac120dfc15b341aab.exe"C:\Users\Admin\AppData\Local\Temp\38b2eca13553190ac120dfc15b341aab.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\38b2eca13553190ac120dfc15b341aab.exeC:\Users\Admin\AppData\Local\Temp\38b2eca13553190ac120dfc15b341aab.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2900
-