Analysis
-
max time kernel
4s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 13:20
Behavioral task
behavioral1
Sample
37c465dcc7b08809c48daef4174c8a54.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
37c465dcc7b08809c48daef4174c8a54.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
37c465dcc7b08809c48daef4174c8a54.exe
-
Size
302KB
-
MD5
37c465dcc7b08809c48daef4174c8a54
-
SHA1
d55919920354cbf05b1c6b8063f139f5d9de15cd
-
SHA256
51f3007637ba5e00c97c9d32217bb8c185961cab60b73614430b015dc474da4c
-
SHA512
4946ef0892c8290a8a913c977045b454abe611c58e96eb20085cb35c4136525d4f7a346d0c6c6d8f7b0e40e5b5651e84c8e2f4bb15ba45a3b6b23008d1e4e90d
-
SSDEEP
3072:+mofVQUqXwQwUHxdNmrRrCTGA9l5/rxUN1s6qN5Szb4xPYpdmc+n4qVpiPEpN+r5:NAQricxdYrYFl51I1s6qo4wmx41PkmQ
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2688 37c465dcc7b08809c48daef4174c8a54.exe -
Executes dropped EXE 1 IoCs
pid Process 2688 37c465dcc7b08809c48daef4174c8a54.exe -
Loads dropped DLL 1 IoCs
pid Process 2168 37c465dcc7b08809c48daef4174c8a54.exe -
resource yara_rule behavioral1/memory/2168-0-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/files/0x000d000000012251-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2168 37c465dcc7b08809c48daef4174c8a54.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2168 37c465dcc7b08809c48daef4174c8a54.exe 2688 37c465dcc7b08809c48daef4174c8a54.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2688 2168 37c465dcc7b08809c48daef4174c8a54.exe 16 PID 2168 wrote to memory of 2688 2168 37c465dcc7b08809c48daef4174c8a54.exe 16 PID 2168 wrote to memory of 2688 2168 37c465dcc7b08809c48daef4174c8a54.exe 16 PID 2168 wrote to memory of 2688 2168 37c465dcc7b08809c48daef4174c8a54.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\37c465dcc7b08809c48daef4174c8a54.exe"C:\Users\Admin\AppData\Local\Temp\37c465dcc7b08809c48daef4174c8a54.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\37c465dcc7b08809c48daef4174c8a54.exeC:\Users\Admin\AppData\Local\Temp\37c465dcc7b08809c48daef4174c8a54.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2688
-