Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:20
Static task
static1
Behavioral task
behavioral1
Sample
27ea5064b47da6889bc4f85cee08559c.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
27ea5064b47da6889bc4f85cee08559c.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
27ea5064b47da6889bc4f85cee08559c.exe
-
Size
593KB
-
MD5
27ea5064b47da6889bc4f85cee08559c
-
SHA1
053faeb0e48cc895d7db1159f2165bb3393d1b2a
-
SHA256
200d990a77563866995f4bcd2d080b33ea4adbb7ada5132d5789c364b1d572b0
-
SHA512
29295c876c0ad5482af2b491300901649d2bbb51bc09acba0a5ec0f6bfda1dc44a109984ce4cc93ab98102457f7c02eb53e2881cc9fb1f96cad6286f38e19152
-
SSDEEP
12288:y+HwU57R8oFZg8MPaFy5pIfzpRN1rcTjC:YUko3ePmrjXcy
Score
1/10
Malware Config
Signatures
-
Suspicious use of UnmapMainImage 3 IoCs
pid Process 2548 27ea5064b47da6889bc4f85cee08559c.exe 2664 27ea5064b47da6889bc4f85cee08559c.exe 2364 27ea5064b47da6889bc4f85cee08559c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2664 2548 27ea5064b47da6889bc4f85cee08559c.exe 29 PID 2548 wrote to memory of 2664 2548 27ea5064b47da6889bc4f85cee08559c.exe 29 PID 2548 wrote to memory of 2664 2548 27ea5064b47da6889bc4f85cee08559c.exe 29 PID 2548 wrote to memory of 2664 2548 27ea5064b47da6889bc4f85cee08559c.exe 29 PID 2548 wrote to memory of 2364 2548 27ea5064b47da6889bc4f85cee08559c.exe 28 PID 2548 wrote to memory of 2364 2548 27ea5064b47da6889bc4f85cee08559c.exe 28 PID 2548 wrote to memory of 2364 2548 27ea5064b47da6889bc4f85cee08559c.exe 28 PID 2548 wrote to memory of 2364 2548 27ea5064b47da6889bc4f85cee08559c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\27ea5064b47da6889bc4f85cee08559c.exe"C:\Users\Admin\AppData\Local\Temp\27ea5064b47da6889bc4f85cee08559c.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\27ea5064b47da6889bc4f85cee08559c.exewatch2⤵
- Suspicious use of UnmapMainImage
PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\27ea5064b47da6889bc4f85cee08559c.exestart2⤵
- Suspicious use of UnmapMainImage
PID:2664
-