Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 03:08
Static task
static1
Behavioral task
behavioral1
Sample
01f4fcadd371286888fada30a7c26b5f.exe
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
01f4fcadd371286888fada30a7c26b5f.exe
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
01f4fcadd371286888fada30a7c26b5f.exe
-
Size
90KB
-
MD5
01f4fcadd371286888fada30a7c26b5f
-
SHA1
528d9d634db5b03acb13a4275daccbf00c16000c
-
SHA256
227b1aa71db09670988603511e7c314f4dc5ac55fdbc9a4e4e6daf9e3e28abb3
-
SHA512
a7813d0005035fcd2ee8751a9af5c1f30c6ef5c925c66c2ad0738a0505e4d1c803570f0ec1085448b0b89acfc3737736745ef9b21bffd1ab9beb112c13262152
-
SSDEEP
1536:s4+CRgd5WFYuCa0BpAvxBbPqbYa3je2G3OafnTWPc1gd11U6BRrcZsWS8jfjh5TR:ff4MFTCaww3PqM3OaLWFdtKK8j7PT14m
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2412 2288 01f4fcadd371286888fada30a7c26b5f.exe 14 PID 2288 wrote to memory of 2412 2288 01f4fcadd371286888fada30a7c26b5f.exe 14 PID 2288 wrote to memory of 2412 2288 01f4fcadd371286888fada30a7c26b5f.exe 14 PID 2288 wrote to memory of 2412 2288 01f4fcadd371286888fada30a7c26b5f.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\01f4fcadd371286888fada30a7c26b5f.exe"C:\Users\Admin\AppData\Local\Temp\01f4fcadd371286888fada30a7c26b5f.exe" 88625909578279445031⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\01f4fcadd371286888fada30a7c26b5f.exe"C:\Users\Admin\AppData\Local\Temp\01f4fcadd371286888fada30a7c26b5f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2288