Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2be543f2c048226b99d06026366506aa.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
2be543f2c048226b99d06026366506aa.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
2be543f2c048226b99d06026366506aa.exe
-
Size
385KB
-
MD5
2be543f2c048226b99d06026366506aa
-
SHA1
195fd42d0573a25ffe78b3863b2b946feb4eca0b
-
SHA256
f80033494d40975f56567c7674db07ca4d36ca958f2821475ac4163fc06ac5a8
-
SHA512
2e37ff85fe089508cc80e257cb203147abbd205f8e11458da71876782ab88219eea2e0bba8b37e6886eb7312b118ef8188cafdb4b9d7fb95ae1e89b08b581819
-
SSDEEP
6144:5nhdo6/wRJhWimnaGYmD9BLBdn7wAQPJNaHsyZJ5lFURLKg1og2HurB:5nI6/8WdBVJ7wzPfYtHw1wwB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4300 2be543f2c048226b99d06026366506aa.exe -
Executes dropped EXE 1 IoCs
pid Process 4300 2be543f2c048226b99d06026366506aa.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4908 2be543f2c048226b99d06026366506aa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4908 2be543f2c048226b99d06026366506aa.exe 4300 2be543f2c048226b99d06026366506aa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4908 wrote to memory of 4300 4908 2be543f2c048226b99d06026366506aa.exe 18 PID 4908 wrote to memory of 4300 4908 2be543f2c048226b99d06026366506aa.exe 18 PID 4908 wrote to memory of 4300 4908 2be543f2c048226b99d06026366506aa.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\2be543f2c048226b99d06026366506aa.exe"C:\Users\Admin\AppData\Local\Temp\2be543f2c048226b99d06026366506aa.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\2be543f2c048226b99d06026366506aa.exeC:\Users\Admin\AppData\Local\Temp\2be543f2c048226b99d06026366506aa.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4300
-