Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 16:16
Static task
static1
Behavioral task
behavioral1
Sample
2c63e5133fac24765bb42c0f38609b36.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c63e5133fac24765bb42c0f38609b36.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
2c63e5133fac24765bb42c0f38609b36.exe
-
Size
601KB
-
MD5
2c63e5133fac24765bb42c0f38609b36
-
SHA1
33ddda5481a2dad113f7fff38d6bde7a3e3d8b41
-
SHA256
e1520fa5c1c1f586f03a4887865737bf70273b956beff913f8bc3d796ca5e3ff
-
SHA512
91e14064e1cc60dfa6ed6ba432c5da1285d5fb297495300a2d64f5f86d3a748c9fb3366bae8e44269376a76b368b6fa1717ce72353db4a9d5e68ec50b817b20f
-
SSDEEP
12288:52UtpTfQdZT15MLiFtkNiG+W7SLN/5gDix0PScqKvnY3QyunoYcS5KE:52UvKT+yG+W7Spxg2G8YaXaX
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2304 2c63e5133fac24765bb42c0f38609b36.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 968 wrote to memory of 2304 968 2c63e5133fac24765bb42c0f38609b36.exe 19 PID 968 wrote to memory of 2304 968 2c63e5133fac24765bb42c0f38609b36.exe 19 PID 968 wrote to memory of 2304 968 2c63e5133fac24765bb42c0f38609b36.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c63e5133fac24765bb42c0f38609b36.exe"C:\Users\Admin\AppData\Local\Temp\2c63e5133fac24765bb42c0f38609b36.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\is-FNDG0.tmp\2c63e5133fac24765bb42c0f38609b36.tmp"C:\Users\Admin\AppData\Local\Temp\is-FNDG0.tmp\2c63e5133fac24765bb42c0f38609b36.tmp" /SL5="$D0184,374917,53248,C:\Users\Admin\AppData\Local\Temp\2c63e5133fac24765bb42c0f38609b36.exe"2⤵
- Executes dropped EXE
PID:2304
-