Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 22:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fc57cbc7cb15a1fc8bbbf30fee2e0435.exe
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
fc57cbc7cb15a1fc8bbbf30fee2e0435.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
fc57cbc7cb15a1fc8bbbf30fee2e0435.exe
-
Size
56KB
-
MD5
fc57cbc7cb15a1fc8bbbf30fee2e0435
-
SHA1
dac4c523097900d6725ecee0dacc7ee30cc9db5a
-
SHA256
b6342b24f3506619d4e2b562d8c85d105615dabba88273785b063bddea065433
-
SHA512
a672ca132aaa00f8fb961e7d3b5bdfd6d9ff8f09160f018d0e517bd059f95bdc451dd6c4a6d28160b98634c94a3c5a3e6bbe44033a6a45abab0de0d201aea0fb
-
SSDEEP
768:BUfiwHgh8yEH/qs9be+7nyWXjx0CJGhJxrLoIXS8YzBanA:BUfiw+85C2be+NV0CJq8FdYA
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2348 fc57cbc7cb15a1fc8bbbf30fee2e0435.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1380 2348 fc57cbc7cb15a1fc8bbbf30fee2e0435.exe 7 PID 2348 wrote to memory of 1380 2348 fc57cbc7cb15a1fc8bbbf30fee2e0435.exe 7 PID 2348 wrote to memory of 1380 2348 fc57cbc7cb15a1fc8bbbf30fee2e0435.exe 7 PID 2348 wrote to memory of 1380 2348 fc57cbc7cb15a1fc8bbbf30fee2e0435.exe 7 PID 2348 wrote to memory of 1380 2348 fc57cbc7cb15a1fc8bbbf30fee2e0435.exe 7 PID 2348 wrote to memory of 1380 2348 fc57cbc7cb15a1fc8bbbf30fee2e0435.exe 7
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc57cbc7cb15a1fc8bbbf30fee2e0435.exe"C:\Users\Admin\AppData\Local\Temp\fc57cbc7cb15a1fc8bbbf30fee2e0435.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2348
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1380