Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 08:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cd973740dfb49d2a0bf37833dac9107f.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
cd973740dfb49d2a0bf37833dac9107f.exe
Resource
win10v2004-20240226-en
3 signatures
150 seconds
General
-
Target
cd973740dfb49d2a0bf37833dac9107f.exe
-
Size
59KB
-
MD5
cd973740dfb49d2a0bf37833dac9107f
-
SHA1
9f9472f2a7a1b980d2609a1878390a9d7e6fb03c
-
SHA256
836d7ee402c7276d4f9a18a1af47391f118111f17787c87767780bb9bea5f56b
-
SHA512
81eb92868854454e3a32aa5f589805a90d810679e169cf5f39667d8a71e183d433b0842c9cf1312b413b21789d79925999bfd74f3220e31c889b84ff715d0504
-
SSDEEP
1536:wCKoLD+h/84UimkdxMxYdSByYJFsEMMP2R:wCKomy45Z2Y0ou3vy
Score
1/10
Malware Config
Signatures
-
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\donc:\d0ok3raddons.dat cd973740dfb49d2a0bf37833dac9107f.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3272 cd973740dfb49d2a0bf37833dac9107f.exe 3272 cd973740dfb49d2a0bf37833dac9107f.exe 3272 cd973740dfb49d2a0bf37833dac9107f.exe 3272 cd973740dfb49d2a0bf37833dac9107f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3272 wrote to memory of 3492 3272 cd973740dfb49d2a0bf37833dac9107f.exe 57 PID 3272 wrote to memory of 3492 3272 cd973740dfb49d2a0bf37833dac9107f.exe 57 PID 3272 wrote to memory of 3492 3272 cd973740dfb49d2a0bf37833dac9107f.exe 57 PID 3272 wrote to memory of 3492 3272 cd973740dfb49d2a0bf37833dac9107f.exe 57
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\cd973740dfb49d2a0bf37833dac9107f.exe"C:\Users\Admin\AppData\Local\Temp\cd973740dfb49d2a0bf37833dac9107f.exe"2⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3272
-