Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-02-2024 01:55
Behavioral task
behavioral1
Sample
1cc6cf68882661395df57d43e89a3e76fd576d77057977a1f65e468bc3e9737c.exe
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
1cc6cf68882661395df57d43e89a3e76fd576d77057977a1f65e468bc3e9737c.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
1cc6cf68882661395df57d43e89a3e76fd576d77057977a1f65e468bc3e9737c.exe
-
Size
492KB
-
MD5
eaf1baf94ce6c382e26902604e9dd013
-
SHA1
4214df85da1c917ac72ef3d051086f09c2b69099
-
SHA256
1cc6cf68882661395df57d43e89a3e76fd576d77057977a1f65e468bc3e9737c
-
SHA512
9f7c24c55fcf3720d3c6ee56ea1d1f90ec4b2942a9a88d7f7073ca377f6921cdb5ed94325e9a93043d9b62141fe6b52c1d934ec52bf6269f751199fed9b47bf5
-
SSDEEP
12288:BZyBBD04d4ZbuwXWuvQBQn7FfhIMu6GL831dCth:nyjCb1tn7FfhIMjGL86b
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2064 2432 1cc6cf68882661395df57d43e89a3e76fd576d77057977a1f65e468bc3e9737c.exe 28 PID 2432 wrote to memory of 2064 2432 1cc6cf68882661395df57d43e89a3e76fd576d77057977a1f65e468bc3e9737c.exe 28 PID 2432 wrote to memory of 2064 2432 1cc6cf68882661395df57d43e89a3e76fd576d77057977a1f65e468bc3e9737c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cc6cf68882661395df57d43e89a3e76fd576d77057977a1f65e468bc3e9737c.exe"C:\Users\Admin\AppData\Local\Temp\1cc6cf68882661395df57d43e89a3e76fd576d77057977a1f65e468bc3e9737c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 3842⤵PID:2064
-