Analysis
-
max time kernel
5s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 14:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Reversed.exe
Resource
win7-20231129-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
Reversed.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
Reversed.exe
-
Size
640KB
-
MD5
625964eb5cf0fdc1d5b77666359a8dd5
-
SHA1
3d8daa1734db83eb1f3cfa85a349c3da4a6bb4aa
-
SHA256
611fd5b9d018315c80b4e858948220df8c31ec01af88b616d46c7b00ed9e4a96
-
SHA512
9b1d3cf96c5056a69325a3374f569b608ab2e788cdaf29739c09d425df8d403669216e93292c7cac403baa87d7e5fb139fd3a9375ff7b54c22decc133aa128a0
-
SSDEEP
12288:fsbxmVj6hhwcxc0XW1kescUbHykjksx2BwdEYRgxrxJEaqr:fsAVj6hecenscUbS3u2qEYRKrxJEn
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2996 2908 Reversed.exe 32 PID 2908 wrote to memory of 2996 2908 Reversed.exe 32 PID 2908 wrote to memory of 2996 2908 Reversed.exe 32 PID 2996 wrote to memory of 2992 2996 cmd.exe 31 PID 2996 wrote to memory of 2992 2996 cmd.exe 31 PID 2996 wrote to memory of 2992 2996 cmd.exe 31 PID 2996 wrote to memory of 2172 2996 cmd.exe 30 PID 2996 wrote to memory of 2172 2996 cmd.exe 30 PID 2996 wrote to memory of 2172 2996 cmd.exe 30 PID 2996 wrote to memory of 3024 2996 cmd.exe 29 PID 2996 wrote to memory of 3024 2996 cmd.exe 29 PID 2996 wrote to memory of 3024 2996 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Reversed.exe"C:\Users\Admin\AppData\Local\Temp\Reversed.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Reversed.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2996
-
-
C:\Windows\system32\find.exefind /i /v "certutil"1⤵PID:3024
-
C:\Windows\system32\find.exefind /i /v "md5"1⤵PID:2172
-
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Reversed.exe" MD51⤵PID:2992