Analysis
-
max time kernel
186s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
9720f82f07210a30f96b72cc73ac3ec55a04aeeceaf6457c17b28e66d6f39e34.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
9720f82f07210a30f96b72cc73ac3ec55a04aeeceaf6457c17b28e66d6f39e34.exe
Resource
win10v2004-20221111-en
2 signatures
150 seconds
General
-
Target
9720f82f07210a30f96b72cc73ac3ec55a04aeeceaf6457c17b28e66d6f39e34.exe
-
Size
56KB
-
MD5
52b89d429b1dd82f3a030d0054ed34c0
-
SHA1
05517faca2d1f6e55f85c7c59a2f9935eb698083
-
SHA256
9720f82f07210a30f96b72cc73ac3ec55a04aeeceaf6457c17b28e66d6f39e34
-
SHA512
8283b5b3b26937dbbe7edd46cfa0b42166b504ba3730433c9e88f97eb70ba182e4ee967434567880da68b1e8696313435fad2ec8d68f442a80702b616af0c22d
-
SSDEEP
1536:kZ/nEkh8OTKNUFH1+L58wPlWIyRDQWItn:axhTKNEH+57ELxYn
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 820 9720f82f07210a30f96b72cc73ac3ec55a04aeeceaf6457c17b28e66d6f39e34.exe 820 9720f82f07210a30f96b72cc73ac3ec55a04aeeceaf6457c17b28e66d6f39e34.exe 820 9720f82f07210a30f96b72cc73ac3ec55a04aeeceaf6457c17b28e66d6f39e34.exe 820 9720f82f07210a30f96b72cc73ac3ec55a04aeeceaf6457c17b28e66d6f39e34.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 820 wrote to memory of 1192 820 9720f82f07210a30f96b72cc73ac3ec55a04aeeceaf6457c17b28e66d6f39e34.exe 55 PID 820 wrote to memory of 1192 820 9720f82f07210a30f96b72cc73ac3ec55a04aeeceaf6457c17b28e66d6f39e34.exe 55 PID 820 wrote to memory of 1192 820 9720f82f07210a30f96b72cc73ac3ec55a04aeeceaf6457c17b28e66d6f39e34.exe 55 PID 820 wrote to memory of 1192 820 9720f82f07210a30f96b72cc73ac3ec55a04aeeceaf6457c17b28e66d6f39e34.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\9720f82f07210a30f96b72cc73ac3ec55a04aeeceaf6457c17b28e66d6f39e34.exe"C:\Users\Admin\AppData\Local\Temp\9720f82f07210a30f96b72cc73ac3ec55a04aeeceaf6457c17b28e66d6f39e34.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:820
-