Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 12:18
Behavioral task
behavioral1
Sample
1db36008d9446d96177c449011f56848.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1db36008d9446d96177c449011f56848.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
1db36008d9446d96177c449011f56848.exe
-
Size
74KB
-
MD5
1db36008d9446d96177c449011f56848
-
SHA1
931d9447c9eedcb0effed4aa0b9cb14a0ede18fc
-
SHA256
dd22cb390e23b2b7b27be5b146d3ec1a0b301eb090cc4768fbbd5be3ee46a582
-
SHA512
dc1cc4f71ecf40a2be0bbc2b99a07c112c772b6519cb670660c3a516f35ae6e4c0aa8f4094191364b5bbe3a1c7e8c9f1e9e6857101da7dc1c4687628f11fc895
-
SSDEEP
1536:7LrM7hWsnHUmPG8TbgtJtVeyrEOhPtGoWiKz3cYpw7USj6xcjRV:P4dYmuJtVeyoOh1lW7c/7USj6
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3988-0-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3988 1db36008d9446d96177c449011f56848.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3988 wrote to memory of 3024 3988 1db36008d9446d96177c449011f56848.exe 91 PID 3988 wrote to memory of 3024 3988 1db36008d9446d96177c449011f56848.exe 91 PID 3988 wrote to memory of 3024 3988 1db36008d9446d96177c449011f56848.exe 91 PID 3988 wrote to memory of 3024 3988 1db36008d9446d96177c449011f56848.exe 91 PID 3988 wrote to memory of 3024 3988 1db36008d9446d96177c449011f56848.exe 91