Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 13:50
Behavioral task
behavioral1
Sample
4e78d37916d7ae549da7d4da2814d040.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
4e78d37916d7ae549da7d4da2814d040.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
4e78d37916d7ae549da7d4da2814d040.exe
-
Size
1010KB
-
MD5
4e78d37916d7ae549da7d4da2814d040
-
SHA1
ff7a954d26480ac2a8ad2f7bd394fc0f71dd1ddf
-
SHA256
04d997767446e4fb27c34e32a4a93802199ab5dff41aa0eb1d1412670e9276ab
-
SHA512
98841c3cdfc4aca89b7b26db090c3384cd6222e26e64a9ad5d78dd100bc962472330ce738cbedb096c0e780d78e7f52ce3b5fc04ad281396217b9d94174242ae
-
SSDEEP
12288:70DihfkPh4w0tTtRYTfm6hiYc5plDFwrilMiYTfm:xhf/wcTtRmfduvlB7lbmf
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2936 4e78d37916d7ae549da7d4da2814d040.exe -
Executes dropped EXE 1 IoCs
pid Process 2936 4e78d37916d7ae549da7d4da2814d040.exe -
Loads dropped DLL 1 IoCs
pid Process 2028 4e78d37916d7ae549da7d4da2814d040.exe -
resource yara_rule behavioral1/memory/2028-0-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/memory/2936-16-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/files/0x000c00000001224a-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2028 4e78d37916d7ae549da7d4da2814d040.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2028 4e78d37916d7ae549da7d4da2814d040.exe 2936 4e78d37916d7ae549da7d4da2814d040.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2936 2028 4e78d37916d7ae549da7d4da2814d040.exe 16 PID 2028 wrote to memory of 2936 2028 4e78d37916d7ae549da7d4da2814d040.exe 16 PID 2028 wrote to memory of 2936 2028 4e78d37916d7ae549da7d4da2814d040.exe 16 PID 2028 wrote to memory of 2936 2028 4e78d37916d7ae549da7d4da2814d040.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e78d37916d7ae549da7d4da2814d040.exe"C:\Users\Admin\AppData\Local\Temp\4e78d37916d7ae549da7d4da2814d040.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\4e78d37916d7ae549da7d4da2814d040.exeC:\Users\Admin\AppData\Local\Temp\4e78d37916d7ae549da7d4da2814d040.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2936
-