Analysis
-
max time kernel
4s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2a8d3c27b1cf9ff356b08c1f88b17079.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2a8d3c27b1cf9ff356b08c1f88b17079.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
2a8d3c27b1cf9ff356b08c1f88b17079.exe
-
Size
385KB
-
MD5
2a8d3c27b1cf9ff356b08c1f88b17079
-
SHA1
0e1c2b759a15aa40ca8beaf3f6da14698c9587b2
-
SHA256
d3348ea42a3bf8d2437993ccf25914a50561708d4055a7dbf80f25b398b18ddd
-
SHA512
697ce68c5d128fe7aee01f4ff913f04229c308bbb5909672d461277bb04000fa3850a157b13ca7175c2b6f16c7231d3a28db1ec83c6c10825fb60ab1294bec28
-
SSDEEP
6144:z/rtrZFtx4fi9RZJZNkmsC1UcW1TjSvyg7rCVB+5EMQbhrxsGp4OjmB:HlZFtx469HN2KWRGvlCqiMgPp2B
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 2a8d3c27b1cf9ff356b08c1f88b17079.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 2a8d3c27b1cf9ff356b08c1f88b17079.exe -
Loads dropped DLL 1 IoCs
pid Process 2760 2a8d3c27b1cf9ff356b08c1f88b17079.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2760 2a8d3c27b1cf9ff356b08c1f88b17079.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2760 2a8d3c27b1cf9ff356b08c1f88b17079.exe 3052 2a8d3c27b1cf9ff356b08c1f88b17079.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 3052 2760 2a8d3c27b1cf9ff356b08c1f88b17079.exe 14 PID 2760 wrote to memory of 3052 2760 2a8d3c27b1cf9ff356b08c1f88b17079.exe 14 PID 2760 wrote to memory of 3052 2760 2a8d3c27b1cf9ff356b08c1f88b17079.exe 14 PID 2760 wrote to memory of 3052 2760 2a8d3c27b1cf9ff356b08c1f88b17079.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a8d3c27b1cf9ff356b08c1f88b17079.exeC:\Users\Admin\AppData\Local\Temp\2a8d3c27b1cf9ff356b08c1f88b17079.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3052
-
C:\Users\Admin\AppData\Local\Temp\2a8d3c27b1cf9ff356b08c1f88b17079.exe"C:\Users\Admin\AppData\Local\Temp\2a8d3c27b1cf9ff356b08c1f88b17079.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2760