Analysis
-
max time kernel
119s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 11:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1b1c79d31c04d160fa9531c938633dc9.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1b1c79d31c04d160fa9531c938633dc9.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
1b1c79d31c04d160fa9531c938633dc9.exe
-
Size
31KB
-
MD5
1b1c79d31c04d160fa9531c938633dc9
-
SHA1
9e5977adf5ffd1382abe52018031c4350fc06b5c
-
SHA256
3a64e5fde1cd87f45b1ed18fd7fcc7b70bc475b84754c05f6b4796c3b81d1881
-
SHA512
6433fdfa0fd4d058e0985a7b4ac35ab476cb8f2b79fe78f4ecefd199f96fbccefad7235a40711a1f493f36bcfadf66b9db5fe96a85118e297d78562120c6e632
-
SSDEEP
768:Z+h7TzTBziifTeiZSVWihwEknh0L7OTLeNfQfg:kZ/nEkh8OTKNd
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1632 1b1c79d31c04d160fa9531c938633dc9.exe 1632 1b1c79d31c04d160fa9531c938633dc9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1360 1632 1b1c79d31c04d160fa9531c938633dc9.exe 10 PID 1632 wrote to memory of 1360 1632 1b1c79d31c04d160fa9531c938633dc9.exe 10 PID 1632 wrote to memory of 1360 1632 1b1c79d31c04d160fa9531c938633dc9.exe 10 PID 1632 wrote to memory of 1360 1632 1b1c79d31c04d160fa9531c938633dc9.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\1b1c79d31c04d160fa9531c938633dc9.exe"C:\Users\Admin\AppData\Local\Temp\1b1c79d31c04d160fa9531c938633dc9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1632
-