Analysis
-
max time kernel
128s -
max time network
152s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
09/07/2020, 07:04
Static task
static1
Behavioral task
behavioral1
Sample
8d3e06384cbad1d3a2d2a1ff747527f67141fbddb9ba9a223d9e69f31afd1d5f.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
8d3e06384cbad1d3a2d2a1ff747527f67141fbddb9ba9a223d9e69f31afd1d5f.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
8d3e06384cbad1d3a2d2a1ff747527f67141fbddb9ba9a223d9e69f31afd1d5f.exe
-
Size
152KB
-
MD5
54ce74d7da4e96422bbe999c75f4e8f4
-
SHA1
64ef5b1d805794ab861cd6126d70021a8712b279
-
SHA256
8d3e06384cbad1d3a2d2a1ff747527f67141fbddb9ba9a223d9e69f31afd1d5f
-
SHA512
c3b9e610d56537e969a772406955dd4bf2ef1c8ec7ac0a771c7f6ffcf6f0be0a99025a5f2109689c56f3c9a55c0cbfecf45f15b3e91e0570a9e24eb8956aaa2e
Score
8/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1484 wrote to memory of 1816 1484 8d3e06384cbad1d3a2d2a1ff747527f67141fbddb9ba9a223d9e69f31afd1d5f.exe 69 PID 1484 wrote to memory of 1816 1484 8d3e06384cbad1d3a2d2a1ff747527f67141fbddb9ba9a223d9e69f31afd1d5f.exe 69 PID 1484 wrote to memory of 1816 1484 8d3e06384cbad1d3a2d2a1ff747527f67141fbddb9ba9a223d9e69f31afd1d5f.exe 69 -
Executes dropped EXE 1 IoCs
pid Process 1816 bdif.exe -
NTFS ADS 1 IoCs
description ioc Process File created \??\c:\programdata\e6533cd889\bdif.exe:Zone.Identifier 8d3e06384cbad1d3a2d2a1ff747527f67141fbddb9ba9a223d9e69f31afd1d5f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d3e06384cbad1d3a2d2a1ff747527f67141fbddb9ba9a223d9e69f31afd1d5f.exe"C:\Users\Admin\AppData\Local\Temp\8d3e06384cbad1d3a2d2a1ff747527f67141fbddb9ba9a223d9e69f31afd1d5f.exe"1⤵
- Suspicious use of WriteProcessMemory
- NTFS ADS
PID:1484 -
\??\c:\programdata\e6533cd889\bdif.exec:\programdata\e6533cd889\bdif.exe2⤵
- Executes dropped EXE
PID:1816
-