Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 09:37
Static task
static1
Behavioral task
behavioral1
Sample
4df913ce49b576b541c9f1491fa35578.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
4df913ce49b576b541c9f1491fa35578.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
4df913ce49b576b541c9f1491fa35578.exe
-
Size
3.5MB
-
MD5
4df913ce49b576b541c9f1491fa35578
-
SHA1
7e95d5a188bdc0f0cbbb9760540e51ae14071531
-
SHA256
23f4cf3bd27ada231b8e24cd453e2c795fa0618e858c0b696aaae5ec2fd78991
-
SHA512
9ef62d7b4cef8243af046f1f1d0a2167ef5b67b1d0a93f121227769bbf48991983674d9d9a715c1cdccb91655debf40b8ef227212daa69d4eaaf8ae889a40431
-
SSDEEP
49152:j+UF5eIfqkVn/Bja5TyHPuK4AK4WXpMtOEcC86TNo5RcfzxgBfokwUkR1lKU/MGO:HF8XOZjaIPT4NIOPC8gbflgwUu3ChQ4
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2532 4df913ce49b576b541c9f1491fa35578.tmp -
Loads dropped DLL 3 IoCs
pid Process 2232 4df913ce49b576b541c9f1491fa35578.exe 2532 4df913ce49b576b541c9f1491fa35578.tmp 2532 4df913ce49b576b541c9f1491fa35578.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2532 4df913ce49b576b541c9f1491fa35578.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2532 2232 4df913ce49b576b541c9f1491fa35578.exe 15 PID 2232 wrote to memory of 2532 2232 4df913ce49b576b541c9f1491fa35578.exe 15 PID 2232 wrote to memory of 2532 2232 4df913ce49b576b541c9f1491fa35578.exe 15 PID 2232 wrote to memory of 2532 2232 4df913ce49b576b541c9f1491fa35578.exe 15 PID 2232 wrote to memory of 2532 2232 4df913ce49b576b541c9f1491fa35578.exe 15 PID 2232 wrote to memory of 2532 2232 4df913ce49b576b541c9f1491fa35578.exe 15 PID 2232 wrote to memory of 2532 2232 4df913ce49b576b541c9f1491fa35578.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\4df913ce49b576b541c9f1491fa35578.exe"C:\Users\Admin\AppData\Local\Temp\4df913ce49b576b541c9f1491fa35578.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\is-5CRPD.tmp\4df913ce49b576b541c9f1491fa35578.tmp"C:\Users\Admin\AppData\Local\Temp\is-5CRPD.tmp\4df913ce49b576b541c9f1491fa35578.tmp" /SL5="$4010A,3230774,140800,C:\Users\Admin\AppData\Local\Temp\4df913ce49b576b541c9f1491fa35578.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2532
-