Analysis
-
max time kernel
119s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 22:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1eaf3d6d55d45e7ce7a019b41ed57a21.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1eaf3d6d55d45e7ce7a019b41ed57a21.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
1eaf3d6d55d45e7ce7a019b41ed57a21.exe
-
Size
65KB
-
MD5
1eaf3d6d55d45e7ce7a019b41ed57a21
-
SHA1
dfc14dfd82c3222b76f95eb3067e05b6a7aa1ba4
-
SHA256
e35112a6878d7179d017e944f230ee45613fc8fa88ab25ce451a0cae10bf1e16
-
SHA512
7f5ddd8fdcb23de11df0c735d4536bdd41dceda7c686e24b3dea9851c55c6bd002f71818d09c87a55b67d15368ad0127b58a4e1d3053f1a64f3ecfddb3ca3a84
-
SSDEEP
1536:l7YLOVDssf9ZMeQotjKgUT2UdpQyz27vWwqZU:S6Vv9ZMe4TbQTKU
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2156 2548 1eaf3d6d55d45e7ce7a019b41ed57a21.exe 28 PID 2548 wrote to memory of 2156 2548 1eaf3d6d55d45e7ce7a019b41ed57a21.exe 28 PID 2548 wrote to memory of 2156 2548 1eaf3d6d55d45e7ce7a019b41ed57a21.exe 28 PID 2548 wrote to memory of 2156 2548 1eaf3d6d55d45e7ce7a019b41ed57a21.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1eaf3d6d55d45e7ce7a019b41ed57a21.exe"C:\Users\Admin\AppData\Local\Temp\1eaf3d6d55d45e7ce7a019b41ed57a21.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\1eaf3d6d55d45e7ce7a019b41ed57a21.exe"C:\Users\Admin\AppData\Local\Temp\1eaf3d6d55d45e7ce7a019b41ed57a21.exe" end2⤵PID:2156
-