Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
37674c2709407f4e47d284c46a6691b8.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
37674c2709407f4e47d284c46a6691b8.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
37674c2709407f4e47d284c46a6691b8.exe
-
Size
1.9MB
-
MD5
37674c2709407f4e47d284c46a6691b8
-
SHA1
5e74ee752f70f908ddcb2fac36aa2562a3b34072
-
SHA256
7ad8bc5c8b89746a6a62466017cb49e4d12514ff19f7e71ae440c3357ec3491a
-
SHA512
a9e361c0fa7ebb796078a54490e5048f30c1395325784114a72bcb5fc82a223cf7d19a3f369da966a0f44318d931cf2b7bd1a117d636d041e5f78706893337b3
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10doiJ+5+HrAVLmVTaCvelcpB+JGwNkOyW8b5lL:Qoa1taC070doic5+Hr80dicpfwuOoDI8
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3508 499C.tmp -
Executes dropped EXE 1 IoCs
pid Process 3508 499C.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 596 wrote to memory of 3508 596 37674c2709407f4e47d284c46a6691b8.exe 34 PID 596 wrote to memory of 3508 596 37674c2709407f4e47d284c46a6691b8.exe 34 PID 596 wrote to memory of 3508 596 37674c2709407f4e47d284c46a6691b8.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\37674c2709407f4e47d284c46a6691b8.exe"C:\Users\Admin\AppData\Local\Temp\37674c2709407f4e47d284c46a6691b8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Users\Admin\AppData\Local\Temp\499C.tmp"C:\Users\Admin\AppData\Local\Temp\499C.tmp" --splashC:\Users\Admin\AppData\Local\Temp\37674c2709407f4e47d284c46a6691b8.exe DC687F0E5EEA83DA33C0F95201AABF30C33FC5A0DD1F2530EA552CC20ED50A26A6D8ACC7B3A02E1F0D42FC5A6CC805246D23B57767C4360497669E9DF72CAEF32⤵
- Deletes itself
- Executes dropped EXE
PID:3508
-