Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-01-2024 23:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3f4ed090be1461756b669f86cc591766.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f4ed090be1461756b669f86cc591766.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
3f4ed090be1461756b669f86cc591766.exe
-
Size
364KB
-
MD5
3f4ed090be1461756b669f86cc591766
-
SHA1
666dbd68f56bb9f011a765378a4f3c152977c951
-
SHA256
15adf709e37e1342a24a1a59e0fe09452f7399755e54087b579b230b8d86f37a
-
SHA512
cb4b4d39088b7cafcd27d2403c6c130c439bcd4cf8dbd998bbd0847ecf1358b91aed743554273cbeae2dc29d3c0dff13e43c07a82d893fb7cb683d3ff684a56b
-
SSDEEP
6144:h/na4SSfVkuk/GZyMQqCrJRa2M8NNlpoKr80L6V7e9f44JyFaE+39VhLhiPmtxQ9:5naHSTk+OqCrJ4lkTpoKw7e9f44sF8VK
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1704 3f4ed090be1461756b669f86cc591766.tmp -
Loads dropped DLL 3 IoCs
pid Process 1716 3f4ed090be1461756b669f86cc591766.exe 1704 3f4ed090be1461756b669f86cc591766.tmp 1704 3f4ed090be1461756b669f86cc591766.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1704 3f4ed090be1461756b669f86cc591766.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1704 1716 3f4ed090be1461756b669f86cc591766.exe 14 PID 1716 wrote to memory of 1704 1716 3f4ed090be1461756b669f86cc591766.exe 14 PID 1716 wrote to memory of 1704 1716 3f4ed090be1461756b669f86cc591766.exe 14 PID 1716 wrote to memory of 1704 1716 3f4ed090be1461756b669f86cc591766.exe 14 PID 1716 wrote to memory of 1704 1716 3f4ed090be1461756b669f86cc591766.exe 14 PID 1716 wrote to memory of 1704 1716 3f4ed090be1461756b669f86cc591766.exe 14 PID 1716 wrote to memory of 1704 1716 3f4ed090be1461756b669f86cc591766.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\is-L49U7.tmp\3f4ed090be1461756b669f86cc591766.tmp"C:\Users\Admin\AppData\Local\Temp\is-L49U7.tmp\3f4ed090be1461756b669f86cc591766.tmp" /SL5="$4010A,113279,54272,C:\Users\Admin\AppData\Local\Temp\3f4ed090be1461756b669f86cc591766.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1704
-
C:\Users\Admin\AppData\Local\Temp\3f4ed090be1461756b669f86cc591766.exe"C:\Users\Admin\AppData\Local\Temp\3f4ed090be1461756b669f86cc591766.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1716