Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 16:59
Behavioral task
behavioral1
Sample
511d29788bb51144200080b4340eda6a.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
511d29788bb51144200080b4340eda6a.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
511d29788bb51144200080b4340eda6a.exe
-
Size
42KB
-
MD5
511d29788bb51144200080b4340eda6a
-
SHA1
6f4e95e87cb098cbdf4047d40886b7f9758a13fa
-
SHA256
af2769473f10d154705ebcf6f3417d55e5bb6443ba7f2ea6b3ed4b6afe9c0b6c
-
SHA512
d2f7e494589d274ad299507a853dd33111b9f2f0c3beb835417903c31b5713b2691fb08bf51fc65b60158e940d7c1de4fcf39c079b34c26ce2969121eb5e4fc3
-
SSDEEP
768:Z/txtmFhI9kFtPPDL9ytdBN2POWRTyxkW8wfEJeYKyW6GIxPbPrdW:Z3CfX3/4OO+muxNW61RW
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1672 511d29788bb51144200080b4340eda6a.exe 1672 511d29788bb51144200080b4340eda6a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1100 1672 511d29788bb51144200080b4340eda6a.exe 9 PID 1672 wrote to memory of 1100 1672 511d29788bb51144200080b4340eda6a.exe 9 PID 1672 wrote to memory of 1100 1672 511d29788bb51144200080b4340eda6a.exe 9 PID 1672 wrote to memory of 1100 1672 511d29788bb51144200080b4340eda6a.exe 9
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\511d29788bb51144200080b4340eda6a.exe"C:\Users\Admin\AppData\Local\Temp\511d29788bb51144200080b4340eda6a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1672
-