Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 01:12
Behavioral task
behavioral1
Sample
7357b26945b168261bb1dff98749d097.exe
Resource
win7-20231215-en
General
-
Target
7357b26945b168261bb1dff98749d097.exe
-
Size
2.9MB
-
MD5
7357b26945b168261bb1dff98749d097
-
SHA1
7bfd83eb3a8adbe89cd8eacac9e5a1c5e10c77a5
-
SHA256
229a633e13eb3b3692f08d86072aef095afd9865ec10b1cf9c08485f451f7d87
-
SHA512
203b7439dfea01a62f7a3d1d2e32aa5590d4d41cf973c1a867cbd43ee1d9961951282d237389dcd61918bf87e88b0a2d349ad1c2986a37520ba0a0e7e68259f1
-
SSDEEP
49152:KE9z3Vtwiba5ZP+P2Kt0XrQQERjDP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:KE9z3VOfXKS7ERjDgg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2784 7357b26945b168261bb1dff98749d097.exe -
Executes dropped EXE 1 IoCs
pid Process 2784 7357b26945b168261bb1dff98749d097.exe -
Loads dropped DLL 1 IoCs
pid Process 2668 7357b26945b168261bb1dff98749d097.exe -
resource yara_rule behavioral1/memory/2668-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000a000000012255-10.dat upx behavioral1/files/0x000a000000012255-15.dat upx behavioral1/memory/2668-14-0x0000000003980000-0x0000000003E6F000-memory.dmp upx behavioral1/memory/2784-17-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2668 7357b26945b168261bb1dff98749d097.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2668 7357b26945b168261bb1dff98749d097.exe 2784 7357b26945b168261bb1dff98749d097.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2784 2668 7357b26945b168261bb1dff98749d097.exe 28 PID 2668 wrote to memory of 2784 2668 7357b26945b168261bb1dff98749d097.exe 28 PID 2668 wrote to memory of 2784 2668 7357b26945b168261bb1dff98749d097.exe 28 PID 2668 wrote to memory of 2784 2668 7357b26945b168261bb1dff98749d097.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7357b26945b168261bb1dff98749d097.exe"C:\Users\Admin\AppData\Local\Temp\7357b26945b168261bb1dff98749d097.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\7357b26945b168261bb1dff98749d097.exeC:\Users\Admin\AppData\Local\Temp\7357b26945b168261bb1dff98749d097.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2784
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD58fc9e5948a7a89fe2bbea8aae71f7895
SHA1778a7c67be395232436ffd3d1e98e053f1f50442
SHA256809102688bd8f91cde14e38e961a82ef636fe0775d91fd6f361757d32e8fed1b
SHA512e8379d464909652099d9abe20f7341fe5732a0c715dfd7aa9566e532bb17e6cfa5cafe3443b516b4980a85b827980cd6ccb7c18f7902dbd82e3f1fe6bb4bdb1e
-
Filesize
1.6MB
MD53b707ef8bee81d8215749e65591a0efa
SHA144c3cd431d3c07349da9f35d6242264072d50ebd
SHA256f7f6d89be60f2aebff5289d83d9c4051e577afb2df8ebc6879cb0f287e1d3a19
SHA5120bd1c13afc9def63c53cca020f7b99eb2cb8adfbe7c85252e93ed7faee135950a4aaf7f61778e793550b1901dbce8af8af6352fc4cf2257c892167bf1b106fa9