Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-01-2024 17:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
416d9faa7fd327bbf399f6d024e00823.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
416d9faa7fd327bbf399f6d024e00823.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
416d9faa7fd327bbf399f6d024e00823.exe
-
Size
1.1MB
-
MD5
416d9faa7fd327bbf399f6d024e00823
-
SHA1
9432c6bb604012c4a64da7d7e1b0da7c3befa8e7
-
SHA256
a02160a1446643401646149cefef4fab77de2bf7d3f236f8289cc23fef00c46a
-
SHA512
3ee72d26034f29c2c2bd31f0308e098dc442cf802725cce0740e058b1640f8a72e0680d6a03a3b4cbdb925f0e361fde2b60ee70aea1dac758747d4960a8dcb48
-
SSDEEP
24576:cVpqXSBbfnWHg1NuunNuABl8BKIMkfx6IfO7iE+eQJ76IK1p14:cGXSt2g1AaV84EEIG7N+e0Xq14
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2516 416d9faa7fd327bbf399f6d024e00823.exe 2516 416d9faa7fd327bbf399f6d024e00823.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2516 wrote to memory of 1184 2516 416d9faa7fd327bbf399f6d024e00823.exe 18 PID 2516 wrote to memory of 1184 2516 416d9faa7fd327bbf399f6d024e00823.exe 18 PID 2516 wrote to memory of 1184 2516 416d9faa7fd327bbf399f6d024e00823.exe 18 PID 2516 wrote to memory of 1184 2516 416d9faa7fd327bbf399f6d024e00823.exe 18 PID 2516 wrote to memory of 1184 2516 416d9faa7fd327bbf399f6d024e00823.exe 18 PID 2516 wrote to memory of 1184 2516 416d9faa7fd327bbf399f6d024e00823.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\416d9faa7fd327bbf399f6d024e00823.exe"C:\Users\Admin\AppData\Local\Temp\416d9faa7fd327bbf399f6d024e00823.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2516
-