Analysis
-
max time kernel
172s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 02:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4f4ce2c8525716587e753ec0499ce51b.exe
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
4f4ce2c8525716587e753ec0499ce51b.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
4f4ce2c8525716587e753ec0499ce51b.exe
-
Size
240KB
-
MD5
4f4ce2c8525716587e753ec0499ce51b
-
SHA1
e0577c325f2a146e3959813a6505797fffcb557c
-
SHA256
f69780a16726aeec419bbc3bc099d0e1c7f83fc0c02fbe4ef8a7cd546baf316e
-
SHA512
257fb2447f34fac7c991415ccce6718a3dc9016561fd96b55c748af44d318a94a663e053d8becd6b21e0fa3a6f898dc6a3c634295bd027d9118bbeb075bbde36
-
SSDEEP
6144:kehEH8d3clRwP8FcsngbfBbjQtoyU2rCvc5iVIJTC2:UHQ3cUP8NgZktTU2Oc5nj
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4004 4f4ce2c8525716587e753ec0499ce51b.exe 4004 4f4ce2c8525716587e753ec0499ce51b.exe 4004 4f4ce2c8525716587e753ec0499ce51b.exe 4004 4f4ce2c8525716587e753ec0499ce51b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4004 wrote to memory of 3376 4004 4f4ce2c8525716587e753ec0499ce51b.exe 43 PID 4004 wrote to memory of 3376 4004 4f4ce2c8525716587e753ec0499ce51b.exe 43 PID 4004 wrote to memory of 3376 4004 4f4ce2c8525716587e753ec0499ce51b.exe 43 PID 4004 wrote to memory of 3376 4004 4f4ce2c8525716587e753ec0499ce51b.exe 43
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\4f4ce2c8525716587e753ec0499ce51b.exe"C:\Users\Admin\AppData\Local\Temp\4f4ce2c8525716587e753ec0499ce51b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4004
-