Analysis
-
max time kernel
3s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 10:38
Behavioral task
behavioral1
Sample
40a3cdb5afa0bfb46f387c4cf926e0e2.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
40a3cdb5afa0bfb46f387c4cf926e0e2.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
40a3cdb5afa0bfb46f387c4cf926e0e2.exe
-
Size
605KB
-
MD5
40a3cdb5afa0bfb46f387c4cf926e0e2
-
SHA1
37ccc8f57d8a04c95c9ae5d48b47bad159efbbf4
-
SHA256
573959b746f3aa2cd4d761d4d34d49b83ab2b2d8368eb8ca5d0a053f1aa8abbc
-
SHA512
9929b94dd5e233b8a472c6afe8fd6baa0cee7fcd7d6c278219b153facf1447c606ec53ffa3f8542505c1bb0a12ff48f984cc2ff858557b427e3b6e44cc410509
-
SSDEEP
12288:RKr8qS1MlFmnQdcjdQ5f2uTevYZNIJuKipHm:IAqS1MeQCjdQ5+uav4NVa
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2160 40a3cdb5afa0bfb46f387c4cf926e0e2.exe -
Executes dropped EXE 1 IoCs
pid Process 2160 40a3cdb5afa0bfb46f387c4cf926e0e2.exe -
Loads dropped DLL 1 IoCs
pid Process 1684 40a3cdb5afa0bfb46f387c4cf926e0e2.exe -
resource yara_rule behavioral1/memory/1684-0-0x0000000000400000-0x00000000004E0000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1684 40a3cdb5afa0bfb46f387c4cf926e0e2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1684 40a3cdb5afa0bfb46f387c4cf926e0e2.exe 2160 40a3cdb5afa0bfb46f387c4cf926e0e2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2160 1684 40a3cdb5afa0bfb46f387c4cf926e0e2.exe 15 PID 1684 wrote to memory of 2160 1684 40a3cdb5afa0bfb46f387c4cf926e0e2.exe 15 PID 1684 wrote to memory of 2160 1684 40a3cdb5afa0bfb46f387c4cf926e0e2.exe 15 PID 1684 wrote to memory of 2160 1684 40a3cdb5afa0bfb46f387c4cf926e0e2.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\40a3cdb5afa0bfb46f387c4cf926e0e2.exeC:\Users\Admin\AppData\Local\Temp\40a3cdb5afa0bfb46f387c4cf926e0e2.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2160
-
C:\Users\Admin\AppData\Local\Temp\40a3cdb5afa0bfb46f387c4cf926e0e2.exe"C:\Users\Admin\AppData\Local\Temp\40a3cdb5afa0bfb46f387c4cf926e0e2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1684