Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 12:59
Behavioral task
behavioral1
Sample
162.exe
Resource
win7-20231215-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
162.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral3
Sample
X.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral4
Sample
X.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
X.exe
-
Size
39KB
-
MD5
a5f1ad106a65b097071d8397db5ed78a
-
SHA1
0b368490aaa267989d5a70b88f11513493d82b05
-
SHA256
31b5d8c021ab64237e7eee7bf043d0abb624ae238857616721a7e07fa7c0bd2d
-
SHA512
eea7f105bec3660d3fe65865a28dc39eb90446a3f0cd7b19c91c478c401d76b73e10207de33ea720e8c6319a6ebe5f14ec96fbadfd00ae0c4111cce4db5c7bf5
-
SSDEEP
768:D/qMNNJGiw2YJmOne9+RTQArtovGC2fj8rwuX+hCD3xJPro8f9h9x:GMFk27XMCH6j8rVwCdloK1x
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral3/memory/1316-0-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1316 X.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1316 wrote to memory of 1248 1316 X.exe 28 PID 1316 wrote to memory of 1248 1316 X.exe 28 PID 1316 wrote to memory of 1248 1316 X.exe 28 PID 1316 wrote to memory of 1248 1316 X.exe 28 PID 1316 wrote to memory of 1248 1316 X.exe 28