Analysis
-
max time kernel
3s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 19:58
Behavioral task
behavioral1
Sample
5177d198d38faa0b164ff1c5ddb8fb4c.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
5177d198d38faa0b164ff1c5ddb8fb4c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
5177d198d38faa0b164ff1c5ddb8fb4c.exe
-
Size
11.0MB
-
MD5
5177d198d38faa0b164ff1c5ddb8fb4c
-
SHA1
e6b7703da00a0296fac0226e3ce09ce3e85020df
-
SHA256
773293e35a2c4dd1963431d0e1bf900554dfc53824149813a138182c969a98ad
-
SHA512
a33c33977b190257f3356c20e2618cacdec9e9ff38658e976ca261b56e19fb092f88a4c643c91db60a765a9b5356b3f1bb4ca8f22782aa368f6252ab3161e6ff
-
SSDEEP
98304:z9J1MLiYhXS635mCckFR+vicS43JqqeRnCd7fiNvH1VKx35mCckFR+vicS43:pAuOCS33FR+6cB+Rn07U/1c33FR+6c
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1416 5177d198d38faa0b164ff1c5ddb8fb4c.exe -
Executes dropped EXE 1 IoCs
pid Process 1416 5177d198d38faa0b164ff1c5ddb8fb4c.exe -
Loads dropped DLL 1 IoCs
pid Process 2572 5177d198d38faa0b164ff1c5ddb8fb4c.exe -
resource yara_rule behavioral1/memory/2572-1-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral1/files/0x000a00000001225c-11.dat upx behavioral1/memory/1416-18-0x0000000000400000-0x0000000000D9E000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2572 5177d198d38faa0b164ff1c5ddb8fb4c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2572 5177d198d38faa0b164ff1c5ddb8fb4c.exe 1416 5177d198d38faa0b164ff1c5ddb8fb4c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 1416 2572 5177d198d38faa0b164ff1c5ddb8fb4c.exe 18 PID 2572 wrote to memory of 1416 2572 5177d198d38faa0b164ff1c5ddb8fb4c.exe 18 PID 2572 wrote to memory of 1416 2572 5177d198d38faa0b164ff1c5ddb8fb4c.exe 18 PID 2572 wrote to memory of 1416 2572 5177d198d38faa0b164ff1c5ddb8fb4c.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\5177d198d38faa0b164ff1c5ddb8fb4c.exe"C:\Users\Admin\AppData\Local\Temp\5177d198d38faa0b164ff1c5ddb8fb4c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\5177d198d38faa0b164ff1c5ddb8fb4c.exeC:\Users\Admin\AppData\Local\Temp\5177d198d38faa0b164ff1c5ddb8fb4c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1416
-