Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 04:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7659d2c0ce0505eb24693761d6655c56.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7659d2c0ce0505eb24693761d6655c56.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
7659d2c0ce0505eb24693761d6655c56.exe
-
Size
172KB
-
MD5
7659d2c0ce0505eb24693761d6655c56
-
SHA1
8b24adc3a6160fdcc2661139c6a63bb20d0f87b7
-
SHA256
7a665c78718b50a3a482da32c0b88f7c5c03ad29a70d59cc9186dbc54a3ea884
-
SHA512
b3f7793a8f0ce1160bb0954d035be864f31742070f6c171651996afbac2e51d379dedbfef573198a1da434ef7367bd02e8e9a2d6b35fe85ba134bdfee4fd7224
-
SSDEEP
3072:QknIZjK/nRhby8WpnCrH2+mX5mF5iUzakPhpY8y5PXe233Wo6N1n/WDEvcCRqFns:QkIZui2HkX5mPiUzDaRGzN1/Wo0Cy16
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2168 7659d2c0ce0505eb24693761d6655c56.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1204 2168 7659d2c0ce0505eb24693761d6655c56.exe 13 PID 2168 wrote to memory of 1204 2168 7659d2c0ce0505eb24693761d6655c56.exe 13 PID 2168 wrote to memory of 1204 2168 7659d2c0ce0505eb24693761d6655c56.exe 13 PID 2168 wrote to memory of 1204 2168 7659d2c0ce0505eb24693761d6655c56.exe 13 PID 2168 wrote to memory of 1204 2168 7659d2c0ce0505eb24693761d6655c56.exe 13 PID 2168 wrote to memory of 1204 2168 7659d2c0ce0505eb24693761d6655c56.exe 13
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\7659d2c0ce0505eb24693761d6655c56.exe"C:\Users\Admin\AppData\Local\Temp\7659d2c0ce0505eb24693761d6655c56.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2168
-