Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 02:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4f5d36e8c32d6be4ca9418d75179235a.exe
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
4f5d36e8c32d6be4ca9418d75179235a.exe
Resource
win10v2004-20231222-en
0 signatures
150 seconds
General
-
Target
4f5d36e8c32d6be4ca9418d75179235a.exe
-
Size
84KB
-
MD5
4f5d36e8c32d6be4ca9418d75179235a
-
SHA1
526fd6aec79c92d2ec7c815418e1905324714478
-
SHA256
7f577b5fdb4c53cf7095d6173d3bffcd8e87f6cbc1d7c38709118e06b131ca9f
-
SHA512
f1d7bc5e40b0956fe327866786e928c25aa5048233b09492da12ad38d1e7b0f483962a552f92661ace884824d56fc7ea4c12993acbc749b6aa00f044f589a00b
-
SSDEEP
1536:ZkDR97bXLU9KRX0gvmqCvrFquF6lgXM7g3Nw/HEu9LPkf9U/GxXxZSaf:Sn3XgkREg1SrFquF6f7INu5LMBZSK
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 772 4f5d36e8c32d6be4ca9418d75179235a.exe -
Executes dropped EXE 1 IoCs
pid Process 772 4f5d36e8c32d6be4ca9418d75179235a.exe -
Loads dropped DLL 1 IoCs
pid Process 804 4f5d36e8c32d6be4ca9418d75179235a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 804 4f5d36e8c32d6be4ca9418d75179235a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 804 4f5d36e8c32d6be4ca9418d75179235a.exe 772 4f5d36e8c32d6be4ca9418d75179235a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 804 wrote to memory of 772 804 4f5d36e8c32d6be4ca9418d75179235a.exe 16 PID 804 wrote to memory of 772 804 4f5d36e8c32d6be4ca9418d75179235a.exe 16 PID 804 wrote to memory of 772 804 4f5d36e8c32d6be4ca9418d75179235a.exe 16 PID 804 wrote to memory of 772 804 4f5d36e8c32d6be4ca9418d75179235a.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f5d36e8c32d6be4ca9418d75179235a.exeC:\Users\Admin\AppData\Local\Temp\4f5d36e8c32d6be4ca9418d75179235a.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:772
-
C:\Users\Admin\AppData\Local\Temp\4f5d36e8c32d6be4ca9418d75179235a.exe"C:\Users\Admin\AppData\Local\Temp\4f5d36e8c32d6be4ca9418d75179235a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:804