Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 03:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3bc87fae926de9755374557d8c395e69.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3bc87fae926de9755374557d8c395e69.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
3bc87fae926de9755374557d8c395e69.exe
-
Size
1.8MB
-
MD5
3bc87fae926de9755374557d8c395e69
-
SHA1
f767e0c94824c283b77510b13127cb9b501ee649
-
SHA256
7b79c7605cc2744c636613b1f9f0ea117aeea85f1b47731b8731c910042cc16c
-
SHA512
0b9005d423f0425b546e20b286d2dcf0b01c466431e189ad9ef6421970f8189acb026b75133440e1f168cc765f96ebd99b4e884bae619cea9cdf357094ec316c
-
SSDEEP
49152:I4sV+WblY66fB33/s36yg+MslFoAJ6qyxBrylaYJ:14+d665HELg+L0RBGlaO
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2148 3bc87fae926de9755374557d8c395e69.exe 2148 3bc87fae926de9755374557d8c395e69.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1180 2148 3bc87fae926de9755374557d8c395e69.exe 11 PID 2148 wrote to memory of 1180 2148 3bc87fae926de9755374557d8c395e69.exe 11 PID 2148 wrote to memory of 1180 2148 3bc87fae926de9755374557d8c395e69.exe 11 PID 2148 wrote to memory of 1180 2148 3bc87fae926de9755374557d8c395e69.exe 11 PID 2148 wrote to memory of 1180 2148 3bc87fae926de9755374557d8c395e69.exe 11 PID 2148 wrote to memory of 1180 2148 3bc87fae926de9755374557d8c395e69.exe 11
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\3bc87fae926de9755374557d8c395e69.exe"C:\Users\Admin\AppData\Local\Temp\3bc87fae926de9755374557d8c395e69.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2148
-