Analysis
-
max time kernel
5s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 04:25
Behavioral task
behavioral1
Sample
454725654b8cb414a5c016aff8186d03.exe
Resource
win7-20231129-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
454725654b8cb414a5c016aff8186d03.exe
Resource
win10v2004-20231222-en
0 signatures
150 seconds
General
-
Target
454725654b8cb414a5c016aff8186d03.exe
-
Size
2.0MB
-
MD5
454725654b8cb414a5c016aff8186d03
-
SHA1
a657b55c7e768c6edfd3d305d585d26ad166127c
-
SHA256
7e015f652aa83bc03bd92791b798d7799098c82afd781827f48747c6a364f896
-
SHA512
dfd92379230fb0106bd5771802e4d303d0abf49b14fdb3389653e01fe40eb138e04c6bce01d42f49ac5b76da7bf16491439e102515612d64486a2286b1d78e20
-
SSDEEP
49152:lLTS3BvScakLz0ibq6yqhLMgN0EbLYwE6cakLz0ibq6yqh:lLTQZScakcibiqh/N0EbUwNcakcibiqh
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2076 454725654b8cb414a5c016aff8186d03.exe -
Executes dropped EXE 1 IoCs
pid Process 2076 454725654b8cb414a5c016aff8186d03.exe -
Loads dropped DLL 1 IoCs
pid Process 2024 454725654b8cb414a5c016aff8186d03.exe -
resource yara_rule behavioral1/memory/2024-8-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2672 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2024 454725654b8cb414a5c016aff8186d03.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2024 454725654b8cb414a5c016aff8186d03.exe 2076 454725654b8cb414a5c016aff8186d03.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2076 2024 454725654b8cb414a5c016aff8186d03.exe 17 PID 2024 wrote to memory of 2076 2024 454725654b8cb414a5c016aff8186d03.exe 17 PID 2024 wrote to memory of 2076 2024 454725654b8cb414a5c016aff8186d03.exe 17 PID 2024 wrote to memory of 2076 2024 454725654b8cb414a5c016aff8186d03.exe 17 PID 2076 wrote to memory of 2672 2076 454725654b8cb414a5c016aff8186d03.exe 19 PID 2076 wrote to memory of 2672 2076 454725654b8cb414a5c016aff8186d03.exe 19 PID 2076 wrote to memory of 2672 2076 454725654b8cb414a5c016aff8186d03.exe 19 PID 2076 wrote to memory of 2672 2076 454725654b8cb414a5c016aff8186d03.exe 19 PID 2076 wrote to memory of 2696 2076 454725654b8cb414a5c016aff8186d03.exe 22 PID 2076 wrote to memory of 2696 2076 454725654b8cb414a5c016aff8186d03.exe 22 PID 2076 wrote to memory of 2696 2076 454725654b8cb414a5c016aff8186d03.exe 22 PID 2076 wrote to memory of 2696 2076 454725654b8cb414a5c016aff8186d03.exe 22 PID 2696 wrote to memory of 2624 2696 cmd.exe 20 PID 2696 wrote to memory of 2624 2696 cmd.exe 20 PID 2696 wrote to memory of 2624 2696 cmd.exe 20 PID 2696 wrote to memory of 2624 2696 cmd.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\454725654b8cb414a5c016aff8186d03.exeC:\Users\Admin\AppData\Local\Temp\454725654b8cb414a5c016aff8186d03.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\454725654b8cb414a5c016aff8186d03.exe" /TN 6ek6uOO9da42 /F2⤵
- Creates scheduled task(s)
PID:2672
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 6ek6uOO9da42 > C:\Users\Admin\AppData\Local\Temp\Ab0EThO.xml2⤵
- Suspicious use of WriteProcessMemory
PID:2696
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 6ek6uOO9da421⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\454725654b8cb414a5c016aff8186d03.exe"C:\Users\Admin\AppData\Local\Temp\454725654b8cb414a5c016aff8186d03.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2024