Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-02-2024 15:11
Behavioral task
behavioral1
Sample
8ca5eedcc3e1ba9b3294f58899db2ce1.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
8ca5eedcc3e1ba9b3294f58899db2ce1.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
8ca5eedcc3e1ba9b3294f58899db2ce1.exe
-
Size
142KB
-
MD5
8ca5eedcc3e1ba9b3294f58899db2ce1
-
SHA1
0a9b0db3187403ae53588b9c354f8398f8e98494
-
SHA256
2dc06e5d902fa9ca22897bd5492f5bbf9b8df082315fd98d5d46ae63bead0691
-
SHA512
9fe25855aca6aa01492d0876db766abce60b2583a38c96753fe6defcf85f836ae8b8a7e398c62f7cb4cdb0c6515ea3e69b13b28442ce5583ec76ca69b42738ea
-
SSDEEP
1536:3vQJqbC3hfHT4s21jcxIc237gBCFqXS7yBKBqYqw2zp//VNA637LDXuYdk7jvmWY:KxfzL2Nc+b7gBWO6QnzmeW3m6H/
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2324-0-0x0000000000400000-0x0000000000436000-memory.dmp upx -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2324 8ca5eedcc3e1ba9b3294f58899db2ce1.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2324 wrote to memory of 3032 2324 8ca5eedcc3e1ba9b3294f58899db2ce1.exe 28 PID 2324 wrote to memory of 3032 2324 8ca5eedcc3e1ba9b3294f58899db2ce1.exe 28 PID 2324 wrote to memory of 3032 2324 8ca5eedcc3e1ba9b3294f58899db2ce1.exe 28 PID 2324 wrote to memory of 3032 2324 8ca5eedcc3e1ba9b3294f58899db2ce1.exe 28 PID 2324 wrote to memory of 3032 2324 8ca5eedcc3e1ba9b3294f58899db2ce1.exe 28 PID 2324 wrote to memory of 3032 2324 8ca5eedcc3e1ba9b3294f58899db2ce1.exe 28 PID 2324 wrote to memory of 3032 2324 8ca5eedcc3e1ba9b3294f58899db2ce1.exe 28