Analysis
-
max time kernel
5s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 07:18
Behavioral task
behavioral1
Sample
2d1b95c703d673c915e42299ece673fc.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2d1b95c703d673c915e42299ece673fc.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
2d1b95c703d673c915e42299ece673fc.exe
-
Size
5.5MB
-
MD5
2d1b95c703d673c915e42299ece673fc
-
SHA1
ec02795245c91d4d00ed77dc07e32eea2161db8f
-
SHA256
a4cf459d487738e809170314c63bd58aca8e19aae1a753e19ca1b4b508cf3a1a
-
SHA512
f95e06185e6b70f3053f0a075d4a1700429e789ad303fba0d1eacf4b80d3854584a91cfb6d75fa495c00a3bd49f18766125d776aa9d4e3e32b398b69927184c9
-
SSDEEP
49152:3ntNN2xmj042SlsQpaDhPNgidirGiRday3vRmCFOGNj8mW4JH53R+wVG+l0yd/eV:3tOH9hCzn35mCckFR+vicS43
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3056 2d1b95c703d673c915e42299ece673fc.exe -
Executes dropped EXE 1 IoCs
pid Process 3056 2d1b95c703d673c915e42299ece673fc.exe -
Loads dropped DLL 1 IoCs
pid Process 1520 2d1b95c703d673c915e42299ece673fc.exe -
resource yara_rule behavioral1/memory/1520-0-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral1/memory/3056-18-0x0000000000400000-0x0000000000D9E000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1520 2d1b95c703d673c915e42299ece673fc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1520 2d1b95c703d673c915e42299ece673fc.exe 3056 2d1b95c703d673c915e42299ece673fc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1520 wrote to memory of 3056 1520 2d1b95c703d673c915e42299ece673fc.exe 18 PID 1520 wrote to memory of 3056 1520 2d1b95c703d673c915e42299ece673fc.exe 18 PID 1520 wrote to memory of 3056 1520 2d1b95c703d673c915e42299ece673fc.exe 18 PID 1520 wrote to memory of 3056 1520 2d1b95c703d673c915e42299ece673fc.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d1b95c703d673c915e42299ece673fc.exe"C:\Users\Admin\AppData\Local\Temp\2d1b95c703d673c915e42299ece673fc.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\2d1b95c703d673c915e42299ece673fc.exeC:\Users\Admin\AppData\Local\Temp\2d1b95c703d673c915e42299ece673fc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3056
-