Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 18:00
Behavioral task
behavioral1
Sample
513ba360ac566f170aead4106b8fe6e6.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
513ba360ac566f170aead4106b8fe6e6.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
513ba360ac566f170aead4106b8fe6e6.exe
-
Size
1.6MB
-
MD5
513ba360ac566f170aead4106b8fe6e6
-
SHA1
d3e6ef6ea69119f576ab01938b1f66a545fc88d1
-
SHA256
11f80eae70f2b9b7ac794512c0f55e6e600c248bea6b9f583cf5f3d879063da7
-
SHA512
e638f578b1876b72ba089dea3dc8d50d9944984fbeb0de72beba10da6c074c84b3da609141848cd367aa1c62247aedf6aefecb06443c94424ed637f4856ff8f5
-
SSDEEP
24576:8SbQXpe5cvhktpe/bB3V2S7hsg8+EBCwWdVhRcWI0td:p8Ic6ObBozgkCfhRcP4d
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2176 513ba360ac566f170aead4106b8fe6e6.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 513ba360ac566f170aead4106b8fe6e6.exe -
Loads dropped DLL 1 IoCs
pid Process 2952 513ba360ac566f170aead4106b8fe6e6.exe -
resource yara_rule behavioral1/memory/2952-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2952 513ba360ac566f170aead4106b8fe6e6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2952 513ba360ac566f170aead4106b8fe6e6.exe 2176 513ba360ac566f170aead4106b8fe6e6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2176 2952 513ba360ac566f170aead4106b8fe6e6.exe 17 PID 2952 wrote to memory of 2176 2952 513ba360ac566f170aead4106b8fe6e6.exe 17 PID 2952 wrote to memory of 2176 2952 513ba360ac566f170aead4106b8fe6e6.exe 17 PID 2952 wrote to memory of 2176 2952 513ba360ac566f170aead4106b8fe6e6.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\513ba360ac566f170aead4106b8fe6e6.exe"C:\Users\Admin\AppData\Local\Temp\513ba360ac566f170aead4106b8fe6e6.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\513ba360ac566f170aead4106b8fe6e6.exeC:\Users\Admin\AppData\Local\Temp\513ba360ac566f170aead4106b8fe6e6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2176
-