Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 10:53
Behavioral task
behavioral1
Sample
167d49e1cea00e0592525915b4c971a3.exe
Resource
win7-20231215-en
2 signatures
150 seconds
General
-
Target
167d49e1cea00e0592525915b4c971a3.exe
-
Size
86KB
-
MD5
167d49e1cea00e0592525915b4c971a3
-
SHA1
12c3f460a901f57caf91653909f57dd34982ae26
-
SHA256
cabd9821efbc92ae6f8a7fdb274aea761d97921e0454373b81d95943108c51b4
-
SHA512
43b93e0ed9c72e5925f463afc1dd8b190066d55e79cc511638e2b70ee9445101f5e0c8982ef879694f41d064492e2e1447b148fce7c65f4860ea0431a0221fe7
-
SSDEEP
1536:Cdd8v/VHsWJ6VhKtYIB5l+8h35UM1Xs3SH685CJYRX6HS8IOR0tD/4tVhOpicoHP:Cdd8v/VHsWJ6rKtYIB5l+8h35UM1Xs3x
Malware Config
Signatures
-
Contacts a large (7431) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
resource yara_rule behavioral2/memory/3144-0-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3144-1-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3144 wrote to memory of 4380 3144 167d49e1cea00e0592525915b4c971a3.exe 91 PID 3144 wrote to memory of 4380 3144 167d49e1cea00e0592525915b4c971a3.exe 91 PID 3144 wrote to memory of 4380 3144 167d49e1cea00e0592525915b4c971a3.exe 91