Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 09:10
Behavioral task
behavioral1
Sample
3c7616a08c13c089bad2eb9bf26c46eb.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
3c7616a08c13c089bad2eb9bf26c46eb.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
3c7616a08c13c089bad2eb9bf26c46eb.exe
-
Size
2.9MB
-
MD5
3c7616a08c13c089bad2eb9bf26c46eb
-
SHA1
205a7e546f1ab1c49be233bfc2156f6a5f5ad992
-
SHA256
4d3bd6e6fc911e0d1efd050b20c25e70125e3bdd76a704c42f4e3bcf69c58ace
-
SHA512
bd4d3e7b0a22a0bbf5c23cb1bddf1a10874516365869caa5fd32077d2a7b1ddcbd54e352b402a58eb03da8fd641387b76c5edede047d85a7e92d88e16ce0a1bd
-
SSDEEP
49152:OkqB0KaRzY2K6BM5gaBqSvi0RXoN74NH5HUyNRcUsCVOzetdZJ:2B0RtKFgaBqPGo4HBUCczzM3
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2276 3c7616a08c13c089bad2eb9bf26c46eb.exe -
Executes dropped EXE 1 IoCs
pid Process 2276 3c7616a08c13c089bad2eb9bf26c46eb.exe -
Loads dropped DLL 1 IoCs
pid Process 1732 3c7616a08c13c089bad2eb9bf26c46eb.exe -
resource yara_rule behavioral1/memory/1732-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1732 3c7616a08c13c089bad2eb9bf26c46eb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1732 3c7616a08c13c089bad2eb9bf26c46eb.exe 2276 3c7616a08c13c089bad2eb9bf26c46eb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2276 1732 3c7616a08c13c089bad2eb9bf26c46eb.exe 17 PID 1732 wrote to memory of 2276 1732 3c7616a08c13c089bad2eb9bf26c46eb.exe 17 PID 1732 wrote to memory of 2276 1732 3c7616a08c13c089bad2eb9bf26c46eb.exe 17 PID 1732 wrote to memory of 2276 1732 3c7616a08c13c089bad2eb9bf26c46eb.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c7616a08c13c089bad2eb9bf26c46eb.exe"C:\Users\Admin\AppData\Local\Temp\3c7616a08c13c089bad2eb9bf26c46eb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\3c7616a08c13c089bad2eb9bf26c46eb.exeC:\Users\Admin\AppData\Local\Temp\3c7616a08c13c089bad2eb9bf26c46eb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2276
-