Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 06:43
Behavioral task
behavioral1
Sample
2c0ff09b7f52c8d5751ed955a35811aa.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c0ff09b7f52c8d5751ed955a35811aa.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
2c0ff09b7f52c8d5751ed955a35811aa.exe
-
Size
2.7MB
-
MD5
2c0ff09b7f52c8d5751ed955a35811aa
-
SHA1
b89e0c8ca57f11c6c937bd20f16f87f7622d1071
-
SHA256
c1807361ce295b25109190a64192e52010c1ead7dd26147610aec925f9353175
-
SHA512
c31fb65faabddec800cc9423a80955ed9b7315035ed3e4554dbc94d11fcaf7b3d9a950dcff5a112465b7e585195583be50a2228eecd27d17501bc98d2010876d
-
SSDEEP
49152:Nxdz0+Ho6/sfuNRWc3YAqkTQv/NUm6kB2remntqhcOgV+Cz0asildD:D2gocsW+c3YAqQUWkBtWOgQCz8ild
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3024 2c0ff09b7f52c8d5751ed955a35811aa.exe -
Executes dropped EXE 1 IoCs
pid Process 3024 2c0ff09b7f52c8d5751ed955a35811aa.exe -
Loads dropped DLL 1 IoCs
pid Process 2896 2c0ff09b7f52c8d5751ed955a35811aa.exe -
resource yara_rule behavioral1/memory/2896-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/memory/3024-18-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2896 2c0ff09b7f52c8d5751ed955a35811aa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2896 2c0ff09b7f52c8d5751ed955a35811aa.exe 3024 2c0ff09b7f52c8d5751ed955a35811aa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2896 wrote to memory of 3024 2896 2c0ff09b7f52c8d5751ed955a35811aa.exe 14 PID 2896 wrote to memory of 3024 2896 2c0ff09b7f52c8d5751ed955a35811aa.exe 14 PID 2896 wrote to memory of 3024 2896 2c0ff09b7f52c8d5751ed955a35811aa.exe 14 PID 2896 wrote to memory of 3024 2896 2c0ff09b7f52c8d5751ed955a35811aa.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c0ff09b7f52c8d5751ed955a35811aa.exeC:\Users\Admin\AppData\Local\Temp\2c0ff09b7f52c8d5751ed955a35811aa.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3024
-
C:\Users\Admin\AppData\Local\Temp\2c0ff09b7f52c8d5751ed955a35811aa.exe"C:\Users\Admin\AppData\Local\Temp\2c0ff09b7f52c8d5751ed955a35811aa.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2896