Analysis
-
max time kernel
143s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 06:02
Behavioral task
behavioral1
Sample
2b07db24189f167b83bce1947a26dec4.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2b07db24189f167b83bce1947a26dec4.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
2b07db24189f167b83bce1947a26dec4.exe
-
Size
2.9MB
-
MD5
2b07db24189f167b83bce1947a26dec4
-
SHA1
2b94a152833181dba181ceca909f80536153de94
-
SHA256
aec225a6994f17d9cdc65b66728f7c223bf6505ef2ed74242a63b47c4f5ceacf
-
SHA512
ca76c30744df8c209b8c487226598c82e717fdd040ef10514503ef20d1380ed6e12c6716d7387f8ff515d296c711f5f440ac7bb635b0df42a9126a439d437656
-
SSDEEP
49152:NgDK7pgHMWUGXtiZ+nepXwJizKVjiwQpvPIUswOG+ZcOIwqI2C1J/7Gy:6G7pXpEiZ/AJiu1iwQpHIUstG+ZcEH1j
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3776 2b07db24189f167b83bce1947a26dec4.exe -
Executes dropped EXE 1 IoCs
pid Process 3776 2b07db24189f167b83bce1947a26dec4.exe -
resource yara_rule behavioral2/memory/668-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/3776-12-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 668 2b07db24189f167b83bce1947a26dec4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 668 2b07db24189f167b83bce1947a26dec4.exe 3776 2b07db24189f167b83bce1947a26dec4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 668 wrote to memory of 3776 668 2b07db24189f167b83bce1947a26dec4.exe 19 PID 668 wrote to memory of 3776 668 2b07db24189f167b83bce1947a26dec4.exe 19 PID 668 wrote to memory of 3776 668 2b07db24189f167b83bce1947a26dec4.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b07db24189f167b83bce1947a26dec4.exe"C:\Users\Admin\AppData\Local\Temp\2b07db24189f167b83bce1947a26dec4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\2b07db24189f167b83bce1947a26dec4.exeC:\Users\Admin\AppData\Local\Temp\2b07db24189f167b83bce1947a26dec4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3776
-