Analysis
-
max time kernel
1s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 09:59
Behavioral task
behavioral1
Sample
5fcb07cc35a250b0f570eedf225215d9c35ff1d0e824b6058b9c68c3606b4dc0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5fcb07cc35a250b0f570eedf225215d9c35ff1d0e824b6058b9c68c3606b4dc0.exe
Resource
win10v2004-20221111-en
General
-
Target
5fcb07cc35a250b0f570eedf225215d9c35ff1d0e824b6058b9c68c3606b4dc0.exe
-
Size
333KB
-
MD5
fff00d72eec2fad697bf1b956286c491
-
SHA1
430546bf5b3f27444b40737cb197a92eb513943e
-
SHA256
5fcb07cc35a250b0f570eedf225215d9c35ff1d0e824b6058b9c68c3606b4dc0
-
SHA512
eb8c14e184534b386dabfcfdbe5b5541388d9d410aae9c78c7de27b52103474d1015eb83c91cd37a4cba4a7bd4495537fc006877c56bd2b476052f2dc04b0e82
-
SSDEEP
6144:5Upw0pC3YpMvWMonzGBsNSIc57rkNGQ9JvJ+wvW2D/mKEFQbjQoCH8FVIc:550pClvWVzG6NJCc99jlW2DedFQfR9Fx
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1232 5fcb07cc35a250b0f570eedf225215d9c35ff1d0e824b6058b9c68c3606b4dc0.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1336 1232 5fcb07cc35a250b0f570eedf225215d9c35ff1d0e824b6058b9c68c3606b4dc0.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fcb07cc35a250b0f570eedf225215d9c35ff1d0e824b6058b9c68c3606b4dc0.exe"C:\Users\Admin\AppData\Local\Temp\5fcb07cc35a250b0f570eedf225215d9c35ff1d0e824b6058b9c68c3606b4dc0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1232
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1336