Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:44
Behavioral task
behavioral1
Sample
2c158c96c2948075d8dace759bf5599b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2c158c96c2948075d8dace759bf5599b.exe
Resource
win10v2004-20231215-en
General
-
Target
2c158c96c2948075d8dace759bf5599b.exe
-
Size
2.9MB
-
MD5
2c158c96c2948075d8dace759bf5599b
-
SHA1
2559bb75ce8e4a617c564801dd764679a92e250b
-
SHA256
1663df7e2ed50b39df6210c86b6a670207e8ab5ea24880ba85320d5542a7692a
-
SHA512
892abd13e40b9ba446b8e3430c6e56c46adfa3d1bf3ce991b03e3a1fe22d86fd4bc23ee2269d48166f5c2784fc445cba7c7bc8e14a0d9407d254c55a6c56e54b
-
SSDEEP
49152:3MkfdjhxJqqjYMM+T5fU3v9yWoHKUX8CP4M338dB2IBlGuuDVUsdxxjeQZwxPYRr:3zjxYMrfU/9xenX7gg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4624 2c158c96c2948075d8dace759bf5599b.exe -
Executes dropped EXE 1 IoCs
pid Process 4624 2c158c96c2948075d8dace759bf5599b.exe -
resource yara_rule behavioral2/memory/2292-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000300000001e982-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2292 2c158c96c2948075d8dace759bf5599b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2292 2c158c96c2948075d8dace759bf5599b.exe 4624 2c158c96c2948075d8dace759bf5599b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2292 wrote to memory of 4624 2292 2c158c96c2948075d8dace759bf5599b.exe 89 PID 2292 wrote to memory of 4624 2292 2c158c96c2948075d8dace759bf5599b.exe 89 PID 2292 wrote to memory of 4624 2292 2c158c96c2948075d8dace759bf5599b.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c158c96c2948075d8dace759bf5599b.exe"C:\Users\Admin\AppData\Local\Temp\2c158c96c2948075d8dace759bf5599b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\2c158c96c2948075d8dace759bf5599b.exeC:\Users\Admin\AppData\Local\Temp\2c158c96c2948075d8dace759bf5599b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4624
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD545b3807fada1634a4fbfc046453a9e29
SHA14d1ed3fef2874ff3c30647371152d6e0a2dee7d7
SHA25602b859825acc6bc97d25cee6d346fbbbe7fe61264d0c851271c1245d22fc79bd
SHA51285468839372e1377daffab9576269ce04f03eef4d149a55f36b0ef18a9b04a490b45346850a46943546b239cab5ddfbf5ea74b1a4c56ad890e81fd6b080d1001