Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 17:20
Behavioral task
behavioral1
Sample
ac6e4dc58d9b6b0345c601d66c7d7df7.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
ac6e4dc58d9b6b0345c601d66c7d7df7.exe
Resource
win10v2004-20240226-en
3 signatures
150 seconds
General
-
Target
ac6e4dc58d9b6b0345c601d66c7d7df7.exe
-
Size
141KB
-
MD5
ac6e4dc58d9b6b0345c601d66c7d7df7
-
SHA1
2a16004797abd686996effa9697fc196a1c72fb0
-
SHA256
b159120ed4177ebea161c313de62dcb8ad06768a99095fb3d06a668ed2818594
-
SHA512
0b8669f641ae9f3a7c7d22b793c11822a01e4f9b81f3d8761eb788a2c87776f759810a2a89814c2f4fcb40c4e80db564d88eefede3a2931044daf195620199d7
-
SSDEEP
3072:D/wqEX2IZcMHksJlBVhxA8C2LxP2Xer/KLsYLluVE0g:D/TEX2tTElBzx6ixOc/KY4lYE
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2804-0-0x0000000000400000-0x0000000000436000-memory.dmp upx -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2804 ac6e4dc58d9b6b0345c601d66c7d7df7.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2632 2804 ac6e4dc58d9b6b0345c601d66c7d7df7.exe 28 PID 2804 wrote to memory of 2632 2804 ac6e4dc58d9b6b0345c601d66c7d7df7.exe 28 PID 2804 wrote to memory of 2632 2804 ac6e4dc58d9b6b0345c601d66c7d7df7.exe 28 PID 2804 wrote to memory of 2632 2804 ac6e4dc58d9b6b0345c601d66c7d7df7.exe 28 PID 2804 wrote to memory of 2632 2804 ac6e4dc58d9b6b0345c601d66c7d7df7.exe 28 PID 2804 wrote to memory of 2632 2804 ac6e4dc58d9b6b0345c601d66c7d7df7.exe 28 PID 2804 wrote to memory of 2632 2804 ac6e4dc58d9b6b0345c601d66c7d7df7.exe 28