Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 07:28
Behavioral task
behavioral1
Sample
2d6137b18581e87f4b425552e02e23d1.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2d6137b18581e87f4b425552e02e23d1.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
2d6137b18581e87f4b425552e02e23d1.exe
-
Size
1.3MB
-
MD5
2d6137b18581e87f4b425552e02e23d1
-
SHA1
83083d9a20519fcb28948b59e1cb8467da28dfcb
-
SHA256
ff723f7f0710a1c20f8c1fc92d536b0d6cf1d7b75f37139af31d8d477d046b1d
-
SHA512
db47e71c066bd6c4317fe457e4266412d500c448d074ef7138425333995306b3b4900f906d4add7a5959b48df826fad1f0230a20e006f91756107bb7a33c0b81
-
SSDEEP
24576:AVu3XIdo2BV/tZZRGvonbVcN5ibfvViiNmSkUc96thsmz5RyV8CQ6U9/9Us:Dio2vlZZsvonbVRILS/C6th5z5R68BRt
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3652 2d6137b18581e87f4b425552e02e23d1.exe -
Executes dropped EXE 1 IoCs
pid Process 3652 2d6137b18581e87f4b425552e02e23d1.exe -
resource yara_rule behavioral2/memory/848-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/memory/3652-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 848 2d6137b18581e87f4b425552e02e23d1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 848 2d6137b18581e87f4b425552e02e23d1.exe 3652 2d6137b18581e87f4b425552e02e23d1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 848 wrote to memory of 3652 848 2d6137b18581e87f4b425552e02e23d1.exe 50 PID 848 wrote to memory of 3652 848 2d6137b18581e87f4b425552e02e23d1.exe 50 PID 848 wrote to memory of 3652 848 2d6137b18581e87f4b425552e02e23d1.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d6137b18581e87f4b425552e02e23d1.exe"C:\Users\Admin\AppData\Local\Temp\2d6137b18581e87f4b425552e02e23d1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\2d6137b18581e87f4b425552e02e23d1.exeC:\Users\Admin\AppData\Local\Temp\2d6137b18581e87f4b425552e02e23d1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3652
-