Analysis
-
max time kernel
156s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 04:35
Behavioral task
behavioral1
Sample
0ea8c0d6b8e37dbf100e063582e874a7.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0ea8c0d6b8e37dbf100e063582e874a7.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
0ea8c0d6b8e37dbf100e063582e874a7.exe
-
Size
242KB
-
MD5
0ea8c0d6b8e37dbf100e063582e874a7
-
SHA1
d7f887525653079d088d7dc6e2714a52726aae90
-
SHA256
21c63c71a6b51256e88593be2cce99e224514f2c9a97cb061de6d8861777a665
-
SHA512
c1866547acbe0413e22615e0c70d4923b3c94287e2469e5e203ed78c5549d000b2a3eb41c5240a9c5f8cdd9db3c5926aa9912f5c150a310ecfc680324d66e449
-
SSDEEP
3072:265Cfy7SfnSr/2HFgq6l6dg/F5YSrSjcdidPW4WeIUCl:265Cfy2fAVWdgT1O4ie4TtC
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4568-0-0x0000000000400000-0x000000000043E000-memory.dmp upx -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4568 0ea8c0d6b8e37dbf100e063582e874a7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4568 wrote to memory of 3888 4568 0ea8c0d6b8e37dbf100e063582e874a7.exe 87 PID 4568 wrote to memory of 3888 4568 0ea8c0d6b8e37dbf100e063582e874a7.exe 87 PID 4568 wrote to memory of 3888 4568 0ea8c0d6b8e37dbf100e063582e874a7.exe 87 PID 4568 wrote to memory of 3888 4568 0ea8c0d6b8e37dbf100e063582e874a7.exe 87 PID 4568 wrote to memory of 3888 4568 0ea8c0d6b8e37dbf100e063582e874a7.exe 87 PID 4568 wrote to memory of 3888 4568 0ea8c0d6b8e37dbf100e063582e874a7.exe 87