Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
5d8cfe97991beffd58d0741a9fb4a8b2.exe
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
5d8cfe97991beffd58d0741a9fb4a8b2.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
5d8cfe97991beffd58d0741a9fb4a8b2.exe
-
Size
637KB
-
MD5
5d8cfe97991beffd58d0741a9fb4a8b2
-
SHA1
bed88f5378a7add1c1c6a75f77d4370ae4a16d1d
-
SHA256
2173998e76d8c259c8293e2d67cdae0e2108a20ed1952aa9afee198be28b731a
-
SHA512
aecbbc620002d1d540503ea199092a6cba22c044a4b0400a65e88b4dbd8dbd32bf0f4aabca9d93b3de8f6b8d15688b809631a416eb63c6f01cbd971a446c9096
-
SSDEEP
12288:UV8OdR/XzvG2dR8e7VNLa8IZXNUfBCqEz8bZAC+Up5Op7M:IxXzXR8e7VfjbkUpcp7M
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2148 1540 5d8cfe97991beffd58d0741a9fb4a8b2.exe 29 PID 1540 wrote to memory of 2148 1540 5d8cfe97991beffd58d0741a9fb4a8b2.exe 29 PID 1540 wrote to memory of 2148 1540 5d8cfe97991beffd58d0741a9fb4a8b2.exe 29 PID 1540 wrote to memory of 2148 1540 5d8cfe97991beffd58d0741a9fb4a8b2.exe 29 PID 1540 wrote to memory of 2200 1540 5d8cfe97991beffd58d0741a9fb4a8b2.exe 28 PID 1540 wrote to memory of 2200 1540 5d8cfe97991beffd58d0741a9fb4a8b2.exe 28 PID 1540 wrote to memory of 2200 1540 5d8cfe97991beffd58d0741a9fb4a8b2.exe 28 PID 1540 wrote to memory of 2200 1540 5d8cfe97991beffd58d0741a9fb4a8b2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d8cfe97991beffd58d0741a9fb4a8b2.exe"C:\Users\Admin\AppData\Local\Temp\5d8cfe97991beffd58d0741a9fb4a8b2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\5d8cfe97991beffd58d0741a9fb4a8b2.exewatch2⤵PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\5d8cfe97991beffd58d0741a9fb4a8b2.exestart2⤵PID:2148
-