Analysis
-
max time kernel
149s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 03:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4efc442790ca39e9fcf4abe557ee303b.exe
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
4efc442790ca39e9fcf4abe557ee303b.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
4efc442790ca39e9fcf4abe557ee303b.exe
-
Size
197KB
-
MD5
4efc442790ca39e9fcf4abe557ee303b
-
SHA1
4527bd07348e71556929e1d571f57e1768a04e7b
-
SHA256
eb05ddd17a15cbaebd6ddc41602c080c28557780d51469b8aebc473bd697cdb6
-
SHA512
1e5c00c907dd9adcc70db00fbc6eb32897f75f61ccb07a2dfa1fab28abe5a7a6a5a5e162fe23da8b33a1d9da8c64283df2fb2867db726222784e3501bf8a08cd
-
SSDEEP
6144:eFk3isfIgr6vyTIarCxYFn/xHXvzVuD/MVKPUpn:eFsiQrLrH/JviEIPin
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4564 4efc442790ca39e9fcf4abe557ee303b.exe 4564 4efc442790ca39e9fcf4abe557ee303b.exe 4564 4efc442790ca39e9fcf4abe557ee303b.exe 4564 4efc442790ca39e9fcf4abe557ee303b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4564 wrote to memory of 3512 4564 4efc442790ca39e9fcf4abe557ee303b.exe 50 PID 4564 wrote to memory of 3512 4564 4efc442790ca39e9fcf4abe557ee303b.exe 50 PID 4564 wrote to memory of 3512 4564 4efc442790ca39e9fcf4abe557ee303b.exe 50 PID 4564 wrote to memory of 3512 4564 4efc442790ca39e9fcf4abe557ee303b.exe 50
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\4efc442790ca39e9fcf4abe557ee303b.exe"C:\Users\Admin\AppData\Local\Temp\4efc442790ca39e9fcf4abe557ee303b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4564
-