Analysis
-
max time kernel
39s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 08:08
Static task
static1
Behavioral task
behavioral1
Sample
44435.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
44435.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
44435.exe
-
Size
62KB
-
MD5
f0eccac3a007ffe9cc85d46bc8d5af97
-
SHA1
f82fcd4a67b3a74684b3f0f921959065c7b41d10
-
SHA256
78fec2d4b4193d10fb81dfa4fb2c2d583fc97ede84d8c5ddd161508d5cb378bd
-
SHA512
0f30fa8b2bbd4eedac4d89c59288e9513904fa792cd62f5197f50ee63c10c43f5af1ea28eaa7b01e1de7720f435d048174a56aab492cd2934584e3703946a2ea
-
SSDEEP
1536:AvCT3nPCUlrsobbEp3OT2iXAOTqOTSHpiF:h3PtgobEMKiXNbHF
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2044 44435.exe 2044 44435.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1340 2044 44435.exe 10 PID 2044 wrote to memory of 1340 2044 44435.exe 10 PID 2044 wrote to memory of 1340 2044 44435.exe 10 PID 2044 wrote to memory of 1340 2044 44435.exe 10