Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2c421cff4ac9533c47d596a513bb6fe9.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c421cff4ac9533c47d596a513bb6fe9.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2c421cff4ac9533c47d596a513bb6fe9.exe
-
Size
343KB
-
MD5
2c421cff4ac9533c47d596a513bb6fe9
-
SHA1
8e4102cc87e3c3300c7b00c93bc2664eb17e091f
-
SHA256
d9627cb61bad073dc9138db4a471c860d918e1389a0b6627e69a7f4deee5c055
-
SHA512
f76fb040ab8bf688e92226bfc2d9b4142daf99598e5f0ab7112808fd5523603e81fe2a3045563488b6e84f3b0a5e857903d6f62e589dfeedd5fa8ff63ba21d53
-
SSDEEP
6144:c07dAoSJF2idZecnl20lHRxp3glyLdW4bHna+r3W8UDQB2RCQKhCc:c07tMF3Z4mxxa4lHaw3Wla2RTKgc
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4784 2c421cff4ac9533c47d596a513bb6fe9.exe 4784 2c421cff4ac9533c47d596a513bb6fe9.exe 4784 2c421cff4ac9533c47d596a513bb6fe9.exe 4784 2c421cff4ac9533c47d596a513bb6fe9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4784 wrote to memory of 3408 4784 2c421cff4ac9533c47d596a513bb6fe9.exe 61 PID 4784 wrote to memory of 3408 4784 2c421cff4ac9533c47d596a513bb6fe9.exe 61 PID 4784 wrote to memory of 3408 4784 2c421cff4ac9533c47d596a513bb6fe9.exe 61 PID 4784 wrote to memory of 3408 4784 2c421cff4ac9533c47d596a513bb6fe9.exe 61 PID 4784 wrote to memory of 3408 4784 2c421cff4ac9533c47d596a513bb6fe9.exe 61 PID 4784 wrote to memory of 3408 4784 2c421cff4ac9533c47d596a513bb6fe9.exe 61
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\2c421cff4ac9533c47d596a513bb6fe9.exe"C:\Users\Admin\AppData\Local\Temp\2c421cff4ac9533c47d596a513bb6fe9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4784
-