Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 19:48
Behavioral task
behavioral1
Sample
cc467849415bcbebd296d182efbb5b95.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
cc467849415bcbebd296d182efbb5b95.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
cc467849415bcbebd296d182efbb5b95.exe
-
Size
34KB
-
MD5
cc467849415bcbebd296d182efbb5b95
-
SHA1
820a8daa6c7e3a7ad4af6dd403dafc6e4b649071
-
SHA256
63261913acef40c1720fc982cd9fc11ec61e0974f4e221170b2aa9fe22b632ed
-
SHA512
0302be0c4d4e11d5a50d41c3eb7797b5ebf7ff168d4cfd09ae4d04cba27b610fc4c90f63a87feba35a7dba2a424bad506663a508274f8b3f992be3370a0dac0f
-
SSDEEP
768:ZYjejZ/wZxe/WA1dzJPXd5iOfS1vvzc6f62xYha58Jx:k0pgxeV3VoBLc6f6R7x
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2240 cc467849415bcbebd296d182efbb5b95.exe 2240 cc467849415bcbebd296d182efbb5b95.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1412 2240 cc467849415bcbebd296d182efbb5b95.exe 21 PID 2240 wrote to memory of 1412 2240 cc467849415bcbebd296d182efbb5b95.exe 21 PID 2240 wrote to memory of 1412 2240 cc467849415bcbebd296d182efbb5b95.exe 21 PID 2240 wrote to memory of 1412 2240 cc467849415bcbebd296d182efbb5b95.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\cc467849415bcbebd296d182efbb5b95.exe"C:\Users\Admin\AppData\Local\Temp\cc467849415bcbebd296d182efbb5b95.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240
-