Analysis
-
max time kernel
143s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:52
Behavioral task
behavioral1
Sample
2c4bb58ac8fff8034d9ff19e9b939aa6.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c4bb58ac8fff8034d9ff19e9b939aa6.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
2c4bb58ac8fff8034d9ff19e9b939aa6.exe
-
Size
10.6MB
-
MD5
2c4bb58ac8fff8034d9ff19e9b939aa6
-
SHA1
0cffeda89b6140c329017bcbe1eee38941867f9c
-
SHA256
0bf5778d8c9d0992e9bb58d19149d23fc21e026ff913ad2aad3233515855b8a3
-
SHA512
45831c51984fae56ae6daf0eedc16a4f7a60c773a6b83cdddcba21eda685d079661c66356541182737a983c1ee79871799bc2f227d383e2e772d7dcfea9a349b
-
SSDEEP
196608:WgZgfGS7cXMDkFwVTcXMDkF0g84xocXMDkFwVTcXMDkFD:NZUGSAGbIGf8NGbIG6
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4756 2c4bb58ac8fff8034d9ff19e9b939aa6.exe -
Executes dropped EXE 1 IoCs
pid Process 4756 2c4bb58ac8fff8034d9ff19e9b939aa6.exe -
resource yara_rule behavioral2/memory/1564-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1564 2c4bb58ac8fff8034d9ff19e9b939aa6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1564 2c4bb58ac8fff8034d9ff19e9b939aa6.exe 4756 2c4bb58ac8fff8034d9ff19e9b939aa6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1564 wrote to memory of 4756 1564 2c4bb58ac8fff8034d9ff19e9b939aa6.exe 24 PID 1564 wrote to memory of 4756 1564 2c4bb58ac8fff8034d9ff19e9b939aa6.exe 24 PID 1564 wrote to memory of 4756 1564 2c4bb58ac8fff8034d9ff19e9b939aa6.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c4bb58ac8fff8034d9ff19e9b939aa6.exe"C:\Users\Admin\AppData\Local\Temp\2c4bb58ac8fff8034d9ff19e9b939aa6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\2c4bb58ac8fff8034d9ff19e9b939aa6.exeC:\Users\Admin\AppData\Local\Temp\2c4bb58ac8fff8034d9ff19e9b939aa6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4756
-