Analysis
-
max time kernel
3s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 07:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2c877b4a4f6020bde2023bf5fccb9ba7.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c877b4a4f6020bde2023bf5fccb9ba7.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
2c877b4a4f6020bde2023bf5fccb9ba7.exe
-
Size
2.0MB
-
MD5
2c877b4a4f6020bde2023bf5fccb9ba7
-
SHA1
9e98abc6b57851386fe8281222e936b5b9d10826
-
SHA256
be536a81976cfa53e3fe082fcbdabe21f121bdfc4d89de0e6332698c12bb4690
-
SHA512
236b9a2ae8d3147890947c6460642b60b871a3b58b0a5cef360632c8c54b6e91decfe0aaacec17710a5a8a000371c6020beaab08faa46a99951b125fab0f690d
-
SSDEEP
49152:OFUcx88PWPOpX0SF8Dn9AUsW+iptTmIkQdgnJLvVyGc:O+K88uPCHaj9AUb6Q2nJhyGc
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3012 857C.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3012 857C.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1152 wrote to memory of 3012 1152 2c877b4a4f6020bde2023bf5fccb9ba7.exe 24 PID 1152 wrote to memory of 3012 1152 2c877b4a4f6020bde2023bf5fccb9ba7.exe 24 PID 1152 wrote to memory of 3012 1152 2c877b4a4f6020bde2023bf5fccb9ba7.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c877b4a4f6020bde2023bf5fccb9ba7.exe"C:\Users\Admin\AppData\Local\Temp\2c877b4a4f6020bde2023bf5fccb9ba7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\857C.tmp"C:\Users\Admin\AppData\Local\Temp\857C.tmp" --splashC:\Users\Admin\AppData\Local\Temp\2c877b4a4f6020bde2023bf5fccb9ba7.exe BBABE2EE42CF528CA4D7429966B83534B4B74E64EABBF812D3057233E27E2693393FB513EA3457969B393888F28384B430C96CB3ABEE83409E7B868C3E2359CA2⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
PID:3012 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2c877b4a4f6020bde2023bf5fccb9ba7.docx" /o ""3⤵PID:552
-
-