Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:06
Behavioral task
behavioral1
Sample
373d6f50fa67f2f62264a71eacd82639.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
373d6f50fa67f2f62264a71eacd82639.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
373d6f50fa67f2f62264a71eacd82639.exe
-
Size
1.5MB
-
MD5
373d6f50fa67f2f62264a71eacd82639
-
SHA1
6825eb6914181e644777ac3359bd9277ba6c3596
-
SHA256
0d21c650def465938c70c2885f398e8c5159e32aec362c43f93c8f0184c9b398
-
SHA512
a20509e7aeafccb979160c272d18860803bd6c828019ff0575b4d6efd720438358251e1746048008284f7ab3c078bf576350d2081ec68828023103b1bffdf259
-
SSDEEP
24576:bVfZp4vjVOJWfNSaNxantFFisCHFFn3gmJ6P0ibpsJSZgbD8egAsMCWW:9ZpCVOJWUumDss073gU6P0MqxDlsc
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2900 373d6f50fa67f2f62264a71eacd82639.exe -
Executes dropped EXE 1 IoCs
pid Process 2900 373d6f50fa67f2f62264a71eacd82639.exe -
Loads dropped DLL 1 IoCs
pid Process 1960 373d6f50fa67f2f62264a71eacd82639.exe -
resource yara_rule behavioral1/files/0x000a00000001220d-10.dat upx behavioral1/memory/1960-14-0x0000000003510000-0x00000000039FF000-memory.dmp upx behavioral1/memory/1960-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1960 373d6f50fa67f2f62264a71eacd82639.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1960 373d6f50fa67f2f62264a71eacd82639.exe 2900 373d6f50fa67f2f62264a71eacd82639.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2900 1960 373d6f50fa67f2f62264a71eacd82639.exe 17 PID 1960 wrote to memory of 2900 1960 373d6f50fa67f2f62264a71eacd82639.exe 17 PID 1960 wrote to memory of 2900 1960 373d6f50fa67f2f62264a71eacd82639.exe 17 PID 1960 wrote to memory of 2900 1960 373d6f50fa67f2f62264a71eacd82639.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\373d6f50fa67f2f62264a71eacd82639.exe"C:\Users\Admin\AppData\Local\Temp\373d6f50fa67f2f62264a71eacd82639.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\373d6f50fa67f2f62264a71eacd82639.exeC:\Users\Admin\AppData\Local\Temp\373d6f50fa67f2f62264a71eacd82639.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2900
-