Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 01:04
Behavioral task
behavioral1
Sample
1f0d516882852f1d18f5f0723cf30d14.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1f0d516882852f1d18f5f0723cf30d14.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
1f0d516882852f1d18f5f0723cf30d14.exe
-
Size
2.6MB
-
MD5
1f0d516882852f1d18f5f0723cf30d14
-
SHA1
b80cf1c81498336dbf6c81bfe32bc3546ea2dfd8
-
SHA256
d5c11868d1f270ad17395f5f5332e6ed505ff56294932627c266c2dbc2b6ec5f
-
SHA512
535f590c0c9fa2801296a673185a4cd6d7d06400e41b1455d9e82f01834b9244d1d81922e0d894dacf278c48702f2314a588525f0b017041869c7df8a12db042
-
SSDEEP
49152:pylrGmYSKQt6PLXvpG21/CdPquHHnB2hX3hdop/YuLDN:Yp/YXQt6D/pDCPpHnShdoOm
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1016-2-0x0000000000F40000-0x00000000016B9000-memory.dmp vmprotect behavioral1/memory/1016-10-0x0000000000F40000-0x00000000016B9000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1016 1f0d516882852f1d18f5f0723cf30d14.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1016 wrote to memory of 2088 1016 1f0d516882852f1d18f5f0723cf30d14.exe 29 PID 1016 wrote to memory of 2088 1016 1f0d516882852f1d18f5f0723cf30d14.exe 29 PID 1016 wrote to memory of 2088 1016 1f0d516882852f1d18f5f0723cf30d14.exe 29 PID 1016 wrote to memory of 2088 1016 1f0d516882852f1d18f5f0723cf30d14.exe 29 PID 1016 wrote to memory of 2220 1016 1f0d516882852f1d18f5f0723cf30d14.exe 30 PID 1016 wrote to memory of 2220 1016 1f0d516882852f1d18f5f0723cf30d14.exe 30 PID 1016 wrote to memory of 2220 1016 1f0d516882852f1d18f5f0723cf30d14.exe 30 PID 1016 wrote to memory of 2220 1016 1f0d516882852f1d18f5f0723cf30d14.exe 30 PID 1016 wrote to memory of 2204 1016 1f0d516882852f1d18f5f0723cf30d14.exe 31 PID 1016 wrote to memory of 2204 1016 1f0d516882852f1d18f5f0723cf30d14.exe 31 PID 1016 wrote to memory of 2204 1016 1f0d516882852f1d18f5f0723cf30d14.exe 31 PID 1016 wrote to memory of 2204 1016 1f0d516882852f1d18f5f0723cf30d14.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f0d516882852f1d18f5f0723cf30d14.exe"C:\Users\Admin\AppData\Local\Temp\1f0d516882852f1d18f5f0723cf30d14.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c color 062⤵PID:2088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c color 0C2⤵PID:2204
-