Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:01
Behavioral task
behavioral1
Sample
0c60e553a54ec631d99a8afb32aa5cdc.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0c60e553a54ec631d99a8afb32aa5cdc.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
0c60e553a54ec631d99a8afb32aa5cdc.exe
-
Size
73KB
-
MD5
0c60e553a54ec631d99a8afb32aa5cdc
-
SHA1
525370e2e1f581ac2afda6fce461877a276bb832
-
SHA256
e3c4c3f8d16fe784add55ade13eacc8f10612bc95710e1ddc4cea2345fb46dcd
-
SHA512
560ae95d32d418d268d8a8d126a190acefecda350b8e071d5cbf27e7938c338fe8c5e024a7b23287fe8990a26d4a1d3dedfae3bd296aba5f27e007ae6aa218b2
-
SSDEEP
1536:BHA/QtxOwRXZy5/CEqvc4mLKRAo0QzKPBCgg1m8X:hAUxk5/CEOmLeEBCFt
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2212-0-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2212 0c60e553a54ec631d99a8afb32aa5cdc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2112 2212 0c60e553a54ec631d99a8afb32aa5cdc.exe 28 PID 2212 wrote to memory of 2112 2212 0c60e553a54ec631d99a8afb32aa5cdc.exe 28 PID 2212 wrote to memory of 2112 2212 0c60e553a54ec631d99a8afb32aa5cdc.exe 28 PID 2212 wrote to memory of 2112 2212 0c60e553a54ec631d99a8afb32aa5cdc.exe 28 PID 2212 wrote to memory of 2112 2212 0c60e553a54ec631d99a8afb32aa5cdc.exe 28 PID 2212 wrote to memory of 2112 2212 0c60e553a54ec631d99a8afb32aa5cdc.exe 28 PID 2212 wrote to memory of 2112 2212 0c60e553a54ec631d99a8afb32aa5cdc.exe 28