Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 12:21
Behavioral task
behavioral1
Sample
5381212b0494d9d4ab0b8475cc76d41a.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
5381212b0494d9d4ab0b8475cc76d41a.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
5381212b0494d9d4ab0b8475cc76d41a.exe
-
Size
1.3MB
-
MD5
5381212b0494d9d4ab0b8475cc76d41a
-
SHA1
0413a7a2e1abb5433cfe71a6b84211eb27bc6e28
-
SHA256
d93dc8feba8ef0b906901d2babf6a55ca9e9e316715c0c66e2147aaf7c8b508e
-
SHA512
8ab29f98b0a4c18edff2b0682ec3563374d7f69a84efa9260fa5e2d9edefc9b25a9a1e9dbc864fbc4fd4bb034373a54d9646cb438fcc9bf11b989ee3fe67649f
-
SSDEEP
24576:guOLpu1OkDlEoCb1qv8FYp5c6EZaTKM2lb7V8Xs6193UvG:guOVYOkUK15c6EZIKM2lbCcIp
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1992 5381212b0494d9d4ab0b8475cc76d41a.exe -
Executes dropped EXE 1 IoCs
pid Process 1992 5381212b0494d9d4ab0b8475cc76d41a.exe -
Loads dropped DLL 1 IoCs
pid Process 1104 5381212b0494d9d4ab0b8475cc76d41a.exe -
resource yara_rule behavioral1/memory/1104-0-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1104 5381212b0494d9d4ab0b8475cc76d41a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1104 5381212b0494d9d4ab0b8475cc76d41a.exe 1992 5381212b0494d9d4ab0b8475cc76d41a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1992 1104 5381212b0494d9d4ab0b8475cc76d41a.exe 17 PID 1104 wrote to memory of 1992 1104 5381212b0494d9d4ab0b8475cc76d41a.exe 17 PID 1104 wrote to memory of 1992 1104 5381212b0494d9d4ab0b8475cc76d41a.exe 17 PID 1104 wrote to memory of 1992 1104 5381212b0494d9d4ab0b8475cc76d41a.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\5381212b0494d9d4ab0b8475cc76d41a.exe"C:\Users\Admin\AppData\Local\Temp\5381212b0494d9d4ab0b8475cc76d41a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\5381212b0494d9d4ab0b8475cc76d41a.exeC:\Users\Admin\AppData\Local\Temp\5381212b0494d9d4ab0b8475cc76d41a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1992
-