Analysis
-
max time kernel
109s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 07:04
Behavioral task
behavioral1
Sample
2ca7825e8ccd527abc5a049c9900f6f9.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2ca7825e8ccd527abc5a049c9900f6f9.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
2ca7825e8ccd527abc5a049c9900f6f9.exe
-
Size
2.9MB
-
MD5
2ca7825e8ccd527abc5a049c9900f6f9
-
SHA1
2857b5bb6a0c4355c8dc775db0392dcf25e36d7a
-
SHA256
2fe33e295b3f4d7fc045205c01c72947492065819389264575f38152bdf117d1
-
SHA512
4a5deb456521a685eaca79b95b9cc7759258b38e6faaab97880d44356edc5baeaf53936fd8f22c9195928412dc947acda2d44c3c9a09893aff05956141a1ed6c
-
SSDEEP
49152:6x1dWVn8D8eWMtl/7sUqMz8zq1oyCJN74NH5HUyNRcUsCVOzetdZJ:mcVnq8BMtp+V5yCJ4HBUCczzM3
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2984 2ca7825e8ccd527abc5a049c9900f6f9.exe -
Executes dropped EXE 1 IoCs
pid Process 2984 2ca7825e8ccd527abc5a049c9900f6f9.exe -
resource yara_rule behavioral2/memory/1416-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/2984-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1416 2ca7825e8ccd527abc5a049c9900f6f9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1416 2ca7825e8ccd527abc5a049c9900f6f9.exe 2984 2ca7825e8ccd527abc5a049c9900f6f9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1416 wrote to memory of 2984 1416 2ca7825e8ccd527abc5a049c9900f6f9.exe 22 PID 1416 wrote to memory of 2984 1416 2ca7825e8ccd527abc5a049c9900f6f9.exe 22 PID 1416 wrote to memory of 2984 1416 2ca7825e8ccd527abc5a049c9900f6f9.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ca7825e8ccd527abc5a049c9900f6f9.exe"C:\Users\Admin\AppData\Local\Temp\2ca7825e8ccd527abc5a049c9900f6f9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\2ca7825e8ccd527abc5a049c9900f6f9.exeC:\Users\Admin\AppData\Local\Temp\2ca7825e8ccd527abc5a049c9900f6f9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2984
-