Analysis
-
max time kernel
139s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:55
Behavioral task
behavioral1
Sample
2c65b6b17c5ddd67416dbbef8cd72da8.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c65b6b17c5ddd67416dbbef8cd72da8.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
2c65b6b17c5ddd67416dbbef8cd72da8.exe
-
Size
11.7MB
-
MD5
2c65b6b17c5ddd67416dbbef8cd72da8
-
SHA1
546aecbc563b8dcd7d2616db01f2292bc98cbf70
-
SHA256
b2ade427bb10ff17f0bf2d9bc521ca1b4e419fe6ad16856f7b63bef0081d1d63
-
SHA512
3ddc48176c71ef86f7a880d58c6e838ad2c447ee4a12e7dc2ff1abcfa113908d391b5b4be251dc0cc6c33d0d37e08452b41ce3d746f96421856b5e8c544271c0
-
SSDEEP
196608:Dy47Vnmpauq1jI8666bFyauq1jI867DRCckihauq1jI8666bFyauq1jI86:D3VAlH6qolHc7klH6qolH
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3124 2c65b6b17c5ddd67416dbbef8cd72da8.exe -
Executes dropped EXE 1 IoCs
pid Process 3124 2c65b6b17c5ddd67416dbbef8cd72da8.exe -
resource yara_rule behavioral2/memory/3844-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/3124-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3844 2c65b6b17c5ddd67416dbbef8cd72da8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3844 2c65b6b17c5ddd67416dbbef8cd72da8.exe 3124 2c65b6b17c5ddd67416dbbef8cd72da8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3844 wrote to memory of 3124 3844 2c65b6b17c5ddd67416dbbef8cd72da8.exe 23 PID 3844 wrote to memory of 3124 3844 2c65b6b17c5ddd67416dbbef8cd72da8.exe 23 PID 3844 wrote to memory of 3124 3844 2c65b6b17c5ddd67416dbbef8cd72da8.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c65b6b17c5ddd67416dbbef8cd72da8.exe"C:\Users\Admin\AppData\Local\Temp\2c65b6b17c5ddd67416dbbef8cd72da8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\2c65b6b17c5ddd67416dbbef8cd72da8.exeC:\Users\Admin\AppData\Local\Temp\2c65b6b17c5ddd67416dbbef8cd72da8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3124
-