Analysis
-
max time kernel
165s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 09:21
Behavioral task
behavioral1
Sample
6354ddd444fdbfab060ae528b997292f.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
6354ddd444fdbfab060ae528b997292f.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
6354ddd444fdbfab060ae528b997292f.exe
-
Size
119KB
-
MD5
6354ddd444fdbfab060ae528b997292f
-
SHA1
63752a8f4571076e5c8de9a340817da2020efcf0
-
SHA256
517ba422076d2012c5741bc5bd7ff5eb5d02e8e89919189be03fb5d5fc59b45d
-
SHA512
bbecf036b2f5e9bdf76771023e28139572f44262380a7c397e26047943d19c2a811b9761491b07b2a8bf6ca3c3c214fd923ab7d12a3222312ae0c04f8eb836ee
-
SSDEEP
3072:EZ5sM52KMUT5Zu//qAZ09x0WB8S7b3WlK4:E8tKbuV0bpml
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2080-0-0x0000000000400000-0x0000000000432000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2764 2080 6354ddd444fdbfab060ae528b997292f.exe 29 PID 2080 wrote to memory of 2764 2080 6354ddd444fdbfab060ae528b997292f.exe 29 PID 2080 wrote to memory of 2764 2080 6354ddd444fdbfab060ae528b997292f.exe 29 PID 2080 wrote to memory of 2764 2080 6354ddd444fdbfab060ae528b997292f.exe 29 PID 2080 wrote to memory of 2764 2080 6354ddd444fdbfab060ae528b997292f.exe 29 PID 2080 wrote to memory of 2764 2080 6354ddd444fdbfab060ae528b997292f.exe 29 PID 2080 wrote to memory of 2764 2080 6354ddd444fdbfab060ae528b997292f.exe 29