Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 06:00
Behavioral task
behavioral1
Sample
2af7190681daa4e8b7aa8d6bf1f8c4c4.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2af7190681daa4e8b7aa8d6bf1f8c4c4.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
2af7190681daa4e8b7aa8d6bf1f8c4c4.exe
-
Size
1.3MB
-
MD5
2af7190681daa4e8b7aa8d6bf1f8c4c4
-
SHA1
fb58c7d5c859c245c84f376bedbb25b522e5a162
-
SHA256
40bab5d000877eb27dc8395d3758ee5df4622572e1f7c07328500a0c1bd4663f
-
SHA512
29fdc1201e81b27d5226fe0923235089a5d69c82eeecbd7a305802f6dd8f8e829544a82c54036fc1a6d05e63a836fe64ce3851915b1e15299e85c4c075d2b836
-
SSDEEP
24576:HaLR3s/3BGAwM0XWF5kXEneZoNnkrLmbp1ys0vAOPfRKqlG+ET6Pg5nzhU9/9Us:H4E4eFwEneZbmbp1y4UG+M6miR9j
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4964 2af7190681daa4e8b7aa8d6bf1f8c4c4.exe -
Executes dropped EXE 1 IoCs
pid Process 4964 2af7190681daa4e8b7aa8d6bf1f8c4c4.exe -
resource yara_rule behavioral2/memory/4508-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/memory/4964-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4508 2af7190681daa4e8b7aa8d6bf1f8c4c4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4508 2af7190681daa4e8b7aa8d6bf1f8c4c4.exe 4964 2af7190681daa4e8b7aa8d6bf1f8c4c4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4508 wrote to memory of 4964 4508 2af7190681daa4e8b7aa8d6bf1f8c4c4.exe 30 PID 4508 wrote to memory of 4964 4508 2af7190681daa4e8b7aa8d6bf1f8c4c4.exe 30 PID 4508 wrote to memory of 4964 4508 2af7190681daa4e8b7aa8d6bf1f8c4c4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2af7190681daa4e8b7aa8d6bf1f8c4c4.exe"C:\Users\Admin\AppData\Local\Temp\2af7190681daa4e8b7aa8d6bf1f8c4c4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\2af7190681daa4e8b7aa8d6bf1f8c4c4.exeC:\Users\Admin\AppData\Local\Temp\2af7190681daa4e8b7aa8d6bf1f8c4c4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4964
-