Analysis
-
max time kernel
4s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 06:03
Behavioral task
behavioral1
Sample
4579759f9dd145808485fba6bd256bef.exe
Resource
win7-20231129-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
4579759f9dd145808485fba6bd256bef.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
4579759f9dd145808485fba6bd256bef.exe
-
Size
3.2MB
-
MD5
4579759f9dd145808485fba6bd256bef
-
SHA1
40ecc6fde208f39d080d3003b51a5449f0afc7e3
-
SHA256
c7450d8427addb074ec254db1f50c07fcd464a8e998397a88c07a4502bf01fd7
-
SHA512
a04c2b744e11ba5b7ffa8f411e96f000be60535888eec3c02ab17eaf2d4a35dd2e13de18c701b312492a9d18691f9242eee1c644afbf77059d6d8b3f86faa21f
-
SSDEEP
98304:MIrjicakcmzU581lcakc8JbJMyQcakcmzU581lcakcO:MIrjidlmg587dlaJMdlmg587dlO
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1584 4579759f9dd145808485fba6bd256bef.exe -
Executes dropped EXE 1 IoCs
pid Process 1584 4579759f9dd145808485fba6bd256bef.exe -
Loads dropped DLL 1 IoCs
pid Process 1732 4579759f9dd145808485fba6bd256bef.exe -
resource yara_rule behavioral1/memory/1732-0-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2620 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1732 4579759f9dd145808485fba6bd256bef.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1732 4579759f9dd145808485fba6bd256bef.exe 1584 4579759f9dd145808485fba6bd256bef.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1584 1732 4579759f9dd145808485fba6bd256bef.exe 15 PID 1732 wrote to memory of 1584 1732 4579759f9dd145808485fba6bd256bef.exe 15 PID 1732 wrote to memory of 1584 1732 4579759f9dd145808485fba6bd256bef.exe 15 PID 1732 wrote to memory of 1584 1732 4579759f9dd145808485fba6bd256bef.exe 15 PID 1584 wrote to memory of 2620 1584 4579759f9dd145808485fba6bd256bef.exe 18 PID 1584 wrote to memory of 2620 1584 4579759f9dd145808485fba6bd256bef.exe 18 PID 1584 wrote to memory of 2620 1584 4579759f9dd145808485fba6bd256bef.exe 18 PID 1584 wrote to memory of 2620 1584 4579759f9dd145808485fba6bd256bef.exe 18 PID 1584 wrote to memory of 2716 1584 4579759f9dd145808485fba6bd256bef.exe 21 PID 1584 wrote to memory of 2716 1584 4579759f9dd145808485fba6bd256bef.exe 21 PID 1584 wrote to memory of 2716 1584 4579759f9dd145808485fba6bd256bef.exe 21 PID 1584 wrote to memory of 2716 1584 4579759f9dd145808485fba6bd256bef.exe 21 PID 2716 wrote to memory of 2744 2716 cmd.exe 19 PID 2716 wrote to memory of 2744 2716 cmd.exe 19 PID 2716 wrote to memory of 2744 2716 cmd.exe 19 PID 2716 wrote to memory of 2744 2716 cmd.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\4579759f9dd145808485fba6bd256bef.exeC:\Users\Admin\AppData\Local\Temp\4579759f9dd145808485fba6bd256bef.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\4579759f9dd145808485fba6bd256bef.exe" /TN qm2lmOfce5f6 /F2⤵
- Creates scheduled task(s)
PID:2620
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN qm2lmOfce5f6 > C:\Users\Admin\AppData\Local\Temp\mLdV6D.xml2⤵
- Suspicious use of WriteProcessMemory
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\4579759f9dd145808485fba6bd256bef.exe"C:\Users\Admin\AppData\Local\Temp\4579759f9dd145808485fba6bd256bef.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1732
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN qm2lmOfce5f61⤵PID:2744