Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2c123aca8a53dba0b274ef42b7e94a7c.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c123aca8a53dba0b274ef42b7e94a7c.exe
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
2c123aca8a53dba0b274ef42b7e94a7c.exe
-
Size
1.9MB
-
MD5
2c123aca8a53dba0b274ef42b7e94a7c
-
SHA1
3191a832974f4d9e58607e9d4c375dc97134e5ac
-
SHA256
de0caade52b081a1c081e2df5d9f00299c59ff5bb76df4a42a1b97639a6df1e4
-
SHA512
0f0ce24aea82cdfd8a3f516d7f757a11e492803830d2c70a1cd3c0e5162a8886a291116df8bb5648b4bfa651821af601b83ecfac06e6493bd525cb2dc6a9499b
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10dri8Ht27QmQnaCmCMzvhwMZYn4X7k8sSTRtEc:Qoa1taC070drix7QtnwztCm7rNtEFAZ
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2060 2607.tmp -
Executes dropped EXE 1 IoCs
pid Process 2060 2607.tmp -
Loads dropped DLL 1 IoCs
pid Process 2336 2c123aca8a53dba0b274ef42b7e94a7c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2060 2336 2c123aca8a53dba0b274ef42b7e94a7c.exe 28 PID 2336 wrote to memory of 2060 2336 2c123aca8a53dba0b274ef42b7e94a7c.exe 28 PID 2336 wrote to memory of 2060 2336 2c123aca8a53dba0b274ef42b7e94a7c.exe 28 PID 2336 wrote to memory of 2060 2336 2c123aca8a53dba0b274ef42b7e94a7c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c123aca8a53dba0b274ef42b7e94a7c.exe"C:\Users\Admin\AppData\Local\Temp\2c123aca8a53dba0b274ef42b7e94a7c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\2607.tmp"C:\Users\Admin\AppData\Local\Temp\2607.tmp" --splashC:\Users\Admin\AppData\Local\Temp\2c123aca8a53dba0b274ef42b7e94a7c.exe E3DFEF609B1F14BC06C1E2EE3CF691E46898AEF89447D5D975F015C07741FCADE078BC81750284B61C0BB9390ECED0EB1A244C7E7B1052CD7F52D170D50276002⤵
- Deletes itself
- Executes dropped EXE
PID:2060
-