Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 03:32
Behavioral task
behavioral1
Sample
5bb2d3ce024748ba827f2c8db891e61f.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
5bb2d3ce024748ba827f2c8db891e61f.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
5bb2d3ce024748ba827f2c8db891e61f.exe
-
Size
6.8MB
-
MD5
5bb2d3ce024748ba827f2c8db891e61f
-
SHA1
7009df1e258fe2829d85ed4911b587f1d809000e
-
SHA256
6f61d36c1d82407bc12f6d04524f96e89799030ca04a8b8ce7b2acd096d83591
-
SHA512
14c6dc93479735c09e409661f8bbe4e273912a64aeee8643e9a5aff0d1aef001454723b0834aae19c485c903837f53abefebff0b1b95d916dfbc549463637e87
-
SSDEEP
98304:CC7NwiJ0jvSsJezcpJpA1CFbaAGtk/CztkrWlA5TpnAfRk+6Rz1Lgq75XXmeRLg:7pMqwezcPpAMpJIk6RkyomWDgqz
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3196-1-0x00007FF6FC220000-0x00007FF6FCFB0000-memory.dmp vmprotect behavioral2/memory/3196-2-0x00007FF6FC220000-0x00007FF6FCFB0000-memory.dmp vmprotect behavioral2/memory/3196-6-0x00007FF6FC220000-0x00007FF6FCFB0000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3196 5bb2d3ce024748ba827f2c8db891e61f.exe 3196 5bb2d3ce024748ba827f2c8db891e61f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3196 wrote to memory of 4268 3196 5bb2d3ce024748ba827f2c8db891e61f.exe 52 PID 3196 wrote to memory of 4268 3196 5bb2d3ce024748ba827f2c8db891e61f.exe 52 PID 3196 wrote to memory of 2440 3196 5bb2d3ce024748ba827f2c8db891e61f.exe 99 PID 3196 wrote to memory of 2440 3196 5bb2d3ce024748ba827f2c8db891e61f.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bb2d3ce024748ba827f2c8db891e61f.exe"C:\Users\Admin\AppData\Local\Temp\5bb2d3ce024748ba827f2c8db891e61f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 42⤵PID:4268
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2440
-