Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 15:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3a6507bea6ccad1ad838f5f191d435a7.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
3a6507bea6ccad1ad838f5f191d435a7.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
3a6507bea6ccad1ad838f5f191d435a7.exe
-
Size
1.9MB
-
MD5
3a6507bea6ccad1ad838f5f191d435a7
-
SHA1
e532b6e64d63624be3986a257aba722d0de84066
-
SHA256
d2bf07757c5bd90fbc2b74894e3a699f85067761aecf041e2c9d520684b8810f
-
SHA512
a123943e36271d6b19cefe7113e775201e4a31ee5271b4170b70d49b855bfd7cca361f6f08db5e85f3889813536e27884c15cbdf7b286daa00d99fd3f9443f10
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10dWYCjhjGc2xFvq8YEb4ZAIiG3pCmVxgZQSYNL:Qoa1taC070dY1GvPYERGXcG2Ryd
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1632 F8B.tmp -
Executes dropped EXE 1 IoCs
pid Process 1632 F8B.tmp -
Loads dropped DLL 1 IoCs
pid Process 2196 3a6507bea6ccad1ad838f5f191d435a7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1632 2196 3a6507bea6ccad1ad838f5f191d435a7.exe 28 PID 2196 wrote to memory of 1632 2196 3a6507bea6ccad1ad838f5f191d435a7.exe 28 PID 2196 wrote to memory of 1632 2196 3a6507bea6ccad1ad838f5f191d435a7.exe 28 PID 2196 wrote to memory of 1632 2196 3a6507bea6ccad1ad838f5f191d435a7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a6507bea6ccad1ad838f5f191d435a7.exe"C:\Users\Admin\AppData\Local\Temp\3a6507bea6ccad1ad838f5f191d435a7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\F8B.tmp"C:\Users\Admin\AppData\Local\Temp\F8B.tmp" --splashC:\Users\Admin\AppData\Local\Temp\3a6507bea6ccad1ad838f5f191d435a7.exe 1CCF5CFAF8988AC967F1C1FC409006B37A7079753A5244B238110EBE9FEA4C45736D6361EDD8EFE2D99FEAF49664CCD96431686F2C605EA592C84DE3C62CCA022⤵
- Deletes itself
- Executes dropped EXE
PID:1632
-