Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 12:03
Behavioral task
behavioral1
Sample
17edad88397803f6b1f03ba3c200bed1.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
17edad88397803f6b1f03ba3c200bed1.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
17edad88397803f6b1f03ba3c200bed1.exe
-
Size
85KB
-
MD5
17edad88397803f6b1f03ba3c200bed1
-
SHA1
b2cba259eda774e65c8d63a4601c0d3a0be8c37f
-
SHA256
6ee4bd84546544ae8feaa2c6fa722986eb9f082a0faaa1671a0e2fee61d947e7
-
SHA512
8004a4b79092f822bc16f3f0e7758bd7892c55607661a7ec47f9c33ef1ba7d38dc529a65c481da1523b7a99ba46dc964f4d333d0c5bc27cc03698b598df28c12
-
SSDEEP
1536:qUWR/D8c4uLIu5tj9rWHHS99rzDQYLV8VdLr+k/89ec:qCcTUcR7fDQo8VBh/Ie
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1428-0-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1428 17edad88397803f6b1f03ba3c200bed1.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1428 wrote to memory of 2360 1428 17edad88397803f6b1f03ba3c200bed1.exe 16 PID 1428 wrote to memory of 2360 1428 17edad88397803f6b1f03ba3c200bed1.exe 16 PID 1428 wrote to memory of 2360 1428 17edad88397803f6b1f03ba3c200bed1.exe 16 PID 1428 wrote to memory of 2360 1428 17edad88397803f6b1f03ba3c200bed1.exe 16 PID 1428 wrote to memory of 2360 1428 17edad88397803f6b1f03ba3c200bed1.exe 16 PID 1428 wrote to memory of 2360 1428 17edad88397803f6b1f03ba3c200bed1.exe 16 PID 1428 wrote to memory of 2360 1428 17edad88397803f6b1f03ba3c200bed1.exe 16