Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
2c0ba1adb44ca4939ad1bf3050b5d2df.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2c0ba1adb44ca4939ad1bf3050b5d2df.exe
Resource
win10v2004-20231215-en
General
-
Target
2c0ba1adb44ca4939ad1bf3050b5d2df.exe
-
Size
84KB
-
MD5
2c0ba1adb44ca4939ad1bf3050b5d2df
-
SHA1
d18f62b67bac355ef80976fce0862565b440b77d
-
SHA256
1eb835b816210eebce8e0ab67c6e63c11cc73a8dc396cb92ee5fa23556c7b38a
-
SHA512
71a705c6b92a5d60a92d06026e0c5620663d0f3644795b3628e075c4891eacf83caa2d53583c6f6fc098f5cdd47eb509f3423677f1824e447272562790ff9ba5
-
SSDEEP
1536:8H9jxsD0RQqOjGG83afXWfy7Xjxtyh4zICtkpCdGmICtoe10k3RoD:8djxlyqOSGcaXWKzjxtNzICt1JBX2D
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5020 2c0ba1adb44ca4939ad1bf3050b5d2df.exe -
Executes dropped EXE 1 IoCs
pid Process 5020 2c0ba1adb44ca4939ad1bf3050b5d2df.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3744 2c0ba1adb44ca4939ad1bf3050b5d2df.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3744 2c0ba1adb44ca4939ad1bf3050b5d2df.exe 5020 2c0ba1adb44ca4939ad1bf3050b5d2df.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3744 wrote to memory of 5020 3744 2c0ba1adb44ca4939ad1bf3050b5d2df.exe 91 PID 3744 wrote to memory of 5020 3744 2c0ba1adb44ca4939ad1bf3050b5d2df.exe 91 PID 3744 wrote to memory of 5020 3744 2c0ba1adb44ca4939ad1bf3050b5d2df.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c0ba1adb44ca4939ad1bf3050b5d2df.exe"C:\Users\Admin\AppData\Local\Temp\2c0ba1adb44ca4939ad1bf3050b5d2df.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\2c0ba1adb44ca4939ad1bf3050b5d2df.exeC:\Users\Admin\AppData\Local\Temp\2c0ba1adb44ca4939ad1bf3050b5d2df.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD581faa0ca9231ce79c7a04b6a200ce2a9
SHA1364bf209bfcc9873a22aad08c1a7eb604c851c02
SHA2565246ff73187fa166b8302f56c0f8971e33f3950b0eb1990b986777db332108fb
SHA51253c62b6122d9d295be5e2c98e22f2188af2ff9d4fe3a025abed4dd42177904213c12b208623420385ff89783c39840d40d5f4c78accdca5fb9350cdaacb00972