Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 16:19
Behavioral task
behavioral1
Sample
77d1a8843509e1af8b86bbce2d6e0fc3.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
77d1a8843509e1af8b86bbce2d6e0fc3.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
77d1a8843509e1af8b86bbce2d6e0fc3.exe
-
Size
92KB
-
MD5
77d1a8843509e1af8b86bbce2d6e0fc3
-
SHA1
5f8c693e6cf32f875c160ce723b8244549830a3b
-
SHA256
c34a2e9340309d8a2acc0849b3709e21d656924f9eb8ff1d2cef9be253fc9f49
-
SHA512
e6f1d43a41be1c04b24660a70e22dd64386de8e7a63fd89af587788e744c6e00a8f2bb8555dfebd462c47cb8a010a74d83de55827613560654c92c5fed88edaa
-
SSDEEP
1536:/BDc61hqfc8U8XrPtFMaNk8Kw2r/Op6VcjyV9GyRt4/bruU/8Jth:CDfLLtFPk8nQcgGyRqPB/st
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3216-0-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3216 77d1a8843509e1af8b86bbce2d6e0fc3.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3216 wrote to memory of 964 3216 77d1a8843509e1af8b86bbce2d6e0fc3.exe 85 PID 3216 wrote to memory of 964 3216 77d1a8843509e1af8b86bbce2d6e0fc3.exe 85 PID 3216 wrote to memory of 964 3216 77d1a8843509e1af8b86bbce2d6e0fc3.exe 85 PID 3216 wrote to memory of 964 3216 77d1a8843509e1af8b86bbce2d6e0fc3.exe 85 PID 3216 wrote to memory of 964 3216 77d1a8843509e1af8b86bbce2d6e0fc3.exe 85