Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2548917101f1bdc62a54beaaa29c76ac.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2548917101f1bdc62a54beaaa29c76ac.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2548917101f1bdc62a54beaaa29c76ac.exe
-
Size
178KB
-
MD5
2548917101f1bdc62a54beaaa29c76ac
-
SHA1
766a2ea2bf744a4aa637e00403eefc618a0aad12
-
SHA256
d002f780f4c4f974fcc6bbbc5021b4c19bf8e17a34ea0db5b5ec8c745d4de9cb
-
SHA512
792bf01f0be8c8e13a8aaa25fda77d75afe28a0da4531d8bf88cf65fc0dd4c207143c13f4137ed73c16934749802620af0c90b93a018fbd3625c751d6b2e6506
-
SSDEEP
3072:EEpO+x8pNbsbLpDa4Jisk7sLQcw+biUsOWWqTWW:EEM+x8pNbsbLprJrBLZwYzjr6/
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3032 2548917101f1bdc62a54beaaa29c76ac.exe 3032 2548917101f1bdc62a54beaaa29c76ac.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1272 3032 2548917101f1bdc62a54beaaa29c76ac.exe 10 PID 3032 wrote to memory of 1272 3032 2548917101f1bdc62a54beaaa29c76ac.exe 10 PID 3032 wrote to memory of 1272 3032 2548917101f1bdc62a54beaaa29c76ac.exe 10 PID 3032 wrote to memory of 1272 3032 2548917101f1bdc62a54beaaa29c76ac.exe 10 PID 3032 wrote to memory of 1272 3032 2548917101f1bdc62a54beaaa29c76ac.exe 10 PID 3032 wrote to memory of 1272 3032 2548917101f1bdc62a54beaaa29c76ac.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\2548917101f1bdc62a54beaaa29c76ac.exe"C:\Users\Admin\AppData\Local\Temp\2548917101f1bdc62a54beaaa29c76ac.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032
-