Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1653904e337f9065b0b151f286fe20f9.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1653904e337f9065b0b151f286fe20f9.exe
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
1653904e337f9065b0b151f286fe20f9.exe
-
Size
83KB
-
MD5
1653904e337f9065b0b151f286fe20f9
-
SHA1
e5e34ed0a9eff673289f0d5143cbc182b046dafb
-
SHA256
4f7454f6b682f968ed8f9c15bc0c46ce2086652e76e6a79a0cfd66c9e2964f6e
-
SHA512
ab4d1bcb5d9f91d36a3b415603fae30cb93ed957e8c4888ee881880520b7e0c26aecaf373f7b9d80ced84403022c789ac71bcd77f8baf526327de8923e7270dd
-
SSDEEP
768:OevFI1m0on6HGavZUtQffoaFNnioNQpsGeXlFPVrqX9zm3yr53nm5GMuMQC3aT4o:XtV6HGavRgalfRK9zm30dnvfM1av
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1704 1653904e337f9065b0b151f286fe20f9.exe 1704 1653904e337f9065b0b151f286fe20f9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1264 1704 1653904e337f9065b0b151f286fe20f9.exe 12 PID 1704 wrote to memory of 1264 1704 1653904e337f9065b0b151f286fe20f9.exe 12 PID 1704 wrote to memory of 1264 1704 1653904e337f9065b0b151f286fe20f9.exe 12 PID 1704 wrote to memory of 1264 1704 1653904e337f9065b0b151f286fe20f9.exe 12
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\1653904e337f9065b0b151f286fe20f9.exe"C:\Users\Admin\AppData\Local\Temp\1653904e337f9065b0b151f286fe20f9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704
-