Analysis
-
max time kernel
2s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 22:52
Behavioral task
behavioral1
Sample
54cd3a6d85bd41b342fe0087a27c7777.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
54cd3a6d85bd41b342fe0087a27c7777.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
54cd3a6d85bd41b342fe0087a27c7777.exe
-
Size
5.1MB
-
MD5
54cd3a6d85bd41b342fe0087a27c7777
-
SHA1
d2fe8d90b099693d57da7224c93b46205a557419
-
SHA256
8c3c19478b8c15060c8a3c8074acbf7ad0150e1ea088c11fe8a844b51175d81d
-
SHA512
ead0bfa5aecedcea8c24ce2fa6b3d30056669055e887d81f3e7009e811bab62b7e84c512a772c86bf5e4e86fe0b3b7723774eef2483aedf602b67c83021b60a8
-
SSDEEP
49152:PtMIi6UYcW1qXm6TFr5TmmtDwsWLGaay35bkrfg8FYri+ts5EjdZwaA9jCIFkAd2:1MN6U7iOvxZdJy30g2yOEjjs9/g3
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2220 54cd3a6d85bd41b342fe0087a27c7777.exe -
Executes dropped EXE 1 IoCs
pid Process 2220 54cd3a6d85bd41b342fe0087a27c7777.exe -
Loads dropped DLL 1 IoCs
pid Process 3020 54cd3a6d85bd41b342fe0087a27c7777.exe -
resource yara_rule behavioral1/memory/3020-1-0x0000000000400000-0x0000000000D9E000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3020 54cd3a6d85bd41b342fe0087a27c7777.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3020 54cd3a6d85bd41b342fe0087a27c7777.exe 2220 54cd3a6d85bd41b342fe0087a27c7777.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2220 3020 54cd3a6d85bd41b342fe0087a27c7777.exe 18 PID 3020 wrote to memory of 2220 3020 54cd3a6d85bd41b342fe0087a27c7777.exe 18 PID 3020 wrote to memory of 2220 3020 54cd3a6d85bd41b342fe0087a27c7777.exe 18 PID 3020 wrote to memory of 2220 3020 54cd3a6d85bd41b342fe0087a27c7777.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\54cd3a6d85bd41b342fe0087a27c7777.exe"C:\Users\Admin\AppData\Local\Temp\54cd3a6d85bd41b342fe0087a27c7777.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\54cd3a6d85bd41b342fe0087a27c7777.exeC:\Users\Admin\AppData\Local\Temp\54cd3a6d85bd41b342fe0087a27c7777.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2220
-