Analysis
-
max time kernel
96s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 05:59
Behavioral task
behavioral1
Sample
09e505d0e4cd1fc093c62c1ba57bc6d0.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
09e505d0e4cd1fc093c62c1ba57bc6d0.exe
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
09e505d0e4cd1fc093c62c1ba57bc6d0.exe
-
Size
36KB
-
MD5
09e505d0e4cd1fc093c62c1ba57bc6d0
-
SHA1
b9c87f9e0ac3a77882cb875ebe58a1b7c18463dc
-
SHA256
73f3c1cc383ad866f49459ac74d4b54e75767e4605675d789584496da927173b
-
SHA512
b328d63f255b6db74b461b152d984f23aee0e6321db221341a42303e34b387bc67737bc5ab81cd62b201f8cc0dd04eda9d021ec74486201fe029610629a9fad3
-
SSDEEP
768:AczpyRBunTLPm+0v0zoU9KslLbBx+deV6ZMkUlx:AcuENNB7lLbGnOx
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 316 09e505d0e4cd1fc093c62c1ba57bc6d0.exe 316 09e505d0e4cd1fc093c62c1ba57bc6d0.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 316 09e505d0e4cd1fc093c62c1ba57bc6d0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 316 wrote to memory of 3496 316 09e505d0e4cd1fc093c62c1ba57bc6d0.exe 58 PID 316 wrote to memory of 3496 316 09e505d0e4cd1fc093c62c1ba57bc6d0.exe 58 PID 316 wrote to memory of 3496 316 09e505d0e4cd1fc093c62c1ba57bc6d0.exe 58 PID 316 wrote to memory of 3496 316 09e505d0e4cd1fc093c62c1ba57bc6d0.exe 58
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\09e505d0e4cd1fc093c62c1ba57bc6d0.exe"C:\Users\Admin\AppData\Local\Temp\09e505d0e4cd1fc093c62c1ba57bc6d0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:316
-