Analysis
-
max time kernel
142s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 18:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
34a0d8506d63310ae3ce2b3161158174.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
34a0d8506d63310ae3ce2b3161158174.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
34a0d8506d63310ae3ce2b3161158174.exe
-
Size
55KB
-
MD5
34a0d8506d63310ae3ce2b3161158174
-
SHA1
8a170ae41a4cfcf892bb9c435f242b05fa266719
-
SHA256
37a43787574b54b9816b591d2290a2b6be5c5508849bbc17a8a42f521e4ea4cf
-
SHA512
d5830d3cf188bbb1b931958c4878de4ca2f03c0b933df0b1431ac111406fecf6680a9509addb3abc1f4c2da2c8fac606fcc9a482638a4cf70b63d9bc150dfdd0
-
SSDEEP
1536:/CKoLD+h/84UimkdxMS1tDwNb1RWC4GhEYx:/CKomy45Z5h2ZR9
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1744 34a0d8506d63310ae3ce2b3161158174.exe 1744 34a0d8506d63310ae3ce2b3161158174.exe 1744 34a0d8506d63310ae3ce2b3161158174.exe 1744 34a0d8506d63310ae3ce2b3161158174.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 3372 1744 34a0d8506d63310ae3ce2b3161158174.exe 47 PID 1744 wrote to memory of 3372 1744 34a0d8506d63310ae3ce2b3161158174.exe 47 PID 1744 wrote to memory of 3372 1744 34a0d8506d63310ae3ce2b3161158174.exe 47 PID 1744 wrote to memory of 3372 1744 34a0d8506d63310ae3ce2b3161158174.exe 47
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\34a0d8506d63310ae3ce2b3161158174.exe"C:\Users\Admin\AppData\Local\Temp\34a0d8506d63310ae3ce2b3161158174.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744
-