Analysis
-
max time kernel
121s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:52
Behavioral task
behavioral1
Sample
2c4bb58ac8fff8034d9ff19e9b939aa6.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c4bb58ac8fff8034d9ff19e9b939aa6.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
2c4bb58ac8fff8034d9ff19e9b939aa6.exe
-
Size
10.6MB
-
MD5
2c4bb58ac8fff8034d9ff19e9b939aa6
-
SHA1
0cffeda89b6140c329017bcbe1eee38941867f9c
-
SHA256
0bf5778d8c9d0992e9bb58d19149d23fc21e026ff913ad2aad3233515855b8a3
-
SHA512
45831c51984fae56ae6daf0eedc16a4f7a60c773a6b83cdddcba21eda685d079661c66356541182737a983c1ee79871799bc2f227d383e2e772d7dcfea9a349b
-
SSDEEP
196608:WgZgfGS7cXMDkFwVTcXMDkF0g84xocXMDkFwVTcXMDkFD:NZUGSAGbIGf8NGbIG6
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2724 2c4bb58ac8fff8034d9ff19e9b939aa6.exe -
Executes dropped EXE 1 IoCs
pid Process 2724 2c4bb58ac8fff8034d9ff19e9b939aa6.exe -
Loads dropped DLL 1 IoCs
pid Process 1740 2c4bb58ac8fff8034d9ff19e9b939aa6.exe -
resource yara_rule behavioral1/memory/1740-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/memory/2724-16-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/memory/1740-14-0x00000000047F0000-0x0000000004CD7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1740 2c4bb58ac8fff8034d9ff19e9b939aa6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1740 2c4bb58ac8fff8034d9ff19e9b939aa6.exe 2724 2c4bb58ac8fff8034d9ff19e9b939aa6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2724 1740 2c4bb58ac8fff8034d9ff19e9b939aa6.exe 28 PID 1740 wrote to memory of 2724 1740 2c4bb58ac8fff8034d9ff19e9b939aa6.exe 28 PID 1740 wrote to memory of 2724 1740 2c4bb58ac8fff8034d9ff19e9b939aa6.exe 28 PID 1740 wrote to memory of 2724 1740 2c4bb58ac8fff8034d9ff19e9b939aa6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c4bb58ac8fff8034d9ff19e9b939aa6.exe"C:\Users\Admin\AppData\Local\Temp\2c4bb58ac8fff8034d9ff19e9b939aa6.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\2c4bb58ac8fff8034d9ff19e9b939aa6.exeC:\Users\Admin\AppData\Local\Temp\2c4bb58ac8fff8034d9ff19e9b939aa6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2724
-