Analysis
-
max time kernel
139s -
max time network
69s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
07-07-2020 17:28
Static task
static1
Behavioral task
behavioral1
Sample
6ba7141682d990206505fc29ef16a43b.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6ba7141682d990206505fc29ef16a43b.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
6ba7141682d990206505fc29ef16a43b.exe
-
Size
369KB
-
MD5
6ba7141682d990206505fc29ef16a43b
-
SHA1
b16adba264446d222fe6f4b9d3c9dd40e883bd5a
-
SHA256
37733872a7d58215f79223dd43b1a92877f768bd1344d0570f2fe74ab4db520b
-
SHA512
18a53177a9053607d86b4d8a7c03c505a5cc895f4bfae6842d707118f6aa38c018c19faf0200e1222a8d2eab78e8bbcb706ac170a56672f717959d4611494d2d
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
6ba7141682d990206505fc29ef16a43b.exedescription pid process target process PID 1400 wrote to memory of 1796 1400 6ba7141682d990206505fc29ef16a43b.exe dw20.exe PID 1400 wrote to memory of 1796 1400 6ba7141682d990206505fc29ef16a43b.exe dw20.exe PID 1400 wrote to memory of 1796 1400 6ba7141682d990206505fc29ef16a43b.exe dw20.exe PID 1400 wrote to memory of 1796 1400 6ba7141682d990206505fc29ef16a43b.exe dw20.exe