Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 06:52
Behavioral task
behavioral1
Sample
55c6c2f221dd7f4bfc80aa8c398258d6.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
55c6c2f221dd7f4bfc80aa8c398258d6.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
55c6c2f221dd7f4bfc80aa8c398258d6.exe
-
Size
235KB
-
MD5
55c6c2f221dd7f4bfc80aa8c398258d6
-
SHA1
5e987855bef39788707ee2d858d8a3e3f1e42123
-
SHA256
3b018783cd45a6c9414a93cf1c172e308d7acb4c77b51c15451de48ca974d4f0
-
SHA512
3d3ef6f2102af6ecf890689cef9cded2b33a4d6d0198a82fb07c18697b623ae5b004a10b53044500a1b35107cd6184de981a4aed9618654664997466314d8241
-
SSDEEP
3072:blN9RkkkkkkTLqDX3E6i1HlN9RkkkkkkTLqDX3E6i1k2f:5dkkkkkku21Fdkkkkkku21Lf
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2180-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2180-1-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/files/0x0006000000023201-6.dat upx behavioral2/memory/2180-20-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2180-21-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2180-22-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2180-23-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2180-24-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2180-25-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2180-26-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2180-27-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2180-28-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2180-29-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2180-30-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2180-31-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2180-32-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Drops file in Windows directory 18 IoCs
description ioc Process File created C:\Windows\win32dc\Counter-Strike(patch).exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe File opened for modification C:\Windows\win32dc\Counter-Strike(patch).exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe File created C:\Windows\win32dc\Sims 2 + trainer.exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe File opened for modification C:\Windows\win32dc\Sims 2 + trainer.exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe File opened for modification C:\Windows\win32dc\Sims 2(codes).exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe File created C:\Windows\win32dc\Sims 2 + codes.exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe File created C:\Windows\win32dc\Silent Hill 4(crack).exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe File opened for modification C:\Windows\win32dc\Quake3 crack.exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe File created C:\Windows\win32dc\Quake3 crack.exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe File created C:\Windows\win32dc\UT2004(cdfix).exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe File opened for modification C:\Windows\win32dc\UT2004(cdfix).exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe File created C:\Windows\win32dc\Sims 2(codes).exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe File opened for modification C:\Windows\win32dc\Half-Life 2(fix).exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe File opened for modification C:\Windows\win32dc\Sims 2 + codes.exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe File created C:\Windows\win32dc\Silent Hill 4(serial).exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe File created C:\Windows\win32dc\Quake3 cdfix.exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe File created C:\Windows\win32dc\Half-Life 2(fix).exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe File opened for modification C:\Windows\win32dc\Silent Hill 4(serial).exe 55c6c2f221dd7f4bfc80aa8c398258d6.exe