Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
062beef0131599d4e7af006d76baeaa9.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
062beef0131599d4e7af006d76baeaa9.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
062beef0131599d4e7af006d76baeaa9.exe
-
Size
31KB
-
MD5
062beef0131599d4e7af006d76baeaa9
-
SHA1
b9a64552461462debe069228b3f5030a147bbc67
-
SHA256
79e2c4f98c281c7f8d7ef256c562f461ce644311a19a8dccb439a538e6f962ce
-
SHA512
99293ae3382619d34243e413615bb23c1692d61f2acff124eebcdee20e31b8d106e2b8092bb857323b6a5c74d40caa1a81c51d5a6930721487eb7e9207905d89
-
SSDEEP
768:Z7h7TzTBziifTeiZSVWihwEknh0L7OTLeNfQfK:JZ/nEkh8OTKN/
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2672 062beef0131599d4e7af006d76baeaa9.exe 2672 062beef0131599d4e7af006d76baeaa9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 1208 2672 062beef0131599d4e7af006d76baeaa9.exe 13 PID 2672 wrote to memory of 1208 2672 062beef0131599d4e7af006d76baeaa9.exe 13 PID 2672 wrote to memory of 1208 2672 062beef0131599d4e7af006d76baeaa9.exe 13 PID 2672 wrote to memory of 1208 2672 062beef0131599d4e7af006d76baeaa9.exe 13
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\062beef0131599d4e7af006d76baeaa9.exe"C:\Users\Admin\AppData\Local\Temp\062beef0131599d4e7af006d76baeaa9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2672
-