Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
6bb3604a40748f87db577d757da759671d0d39e4bc6bd602c8ec63bf729a468d.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
6bb3604a40748f87db577d757da759671d0d39e4bc6bd602c8ec63bf729a468d.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
6bb3604a40748f87db577d757da759671d0d39e4bc6bd602c8ec63bf729a468d.exe
-
Size
101KB
-
MD5
0d72453b09a5abe0b27401daab7015fd
-
SHA1
3746a65d7c21b62cc5a60cf077a7408e7fac5b7c
-
SHA256
6bb3604a40748f87db577d757da759671d0d39e4bc6bd602c8ec63bf729a468d
-
SHA512
884d9fc61b2137d7ac097a2907db543df8a07f12d747c9f52daa5959c7ea921dcf92d0191136663f10d97d142b5aa4229acea5b52437e3056d8977b42cd60acc
-
SSDEEP
3072:Pb2XkMxzeqifjbT81cPB6Ds4AFDzq+7A0:PAtMrbT8eZqs4A5zq+7
Score
1/10
Malware Config
Signatures
-
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2016 6bb3604a40748f87db577d757da759671d0d39e4bc6bd602c8ec63bf729a468d.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1208 2016 6bb3604a40748f87db577d757da759671d0d39e4bc6bd602c8ec63bf729a468d.exe 19 PID 2016 wrote to memory of 1208 2016 6bb3604a40748f87db577d757da759671d0d39e4bc6bd602c8ec63bf729a468d.exe 19
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\6bb3604a40748f87db577d757da759671d0d39e4bc6bd602c8ec63bf729a468d.exe"C:\Users\Admin\AppData\Local\Temp\6bb3604a40748f87db577d757da759671d0d39e4bc6bd602c8ec63bf729a468d.exe"2⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2016
-