Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 19:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d4484acf2ddbaa23f052e43c1d36250b.exe
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
d4484acf2ddbaa23f052e43c1d36250b.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
d4484acf2ddbaa23f052e43c1d36250b.exe
-
Size
196KB
-
MD5
d4484acf2ddbaa23f052e43c1d36250b
-
SHA1
bb208b312e3bcc669b1130e9ec15173732cb6830
-
SHA256
cf25791f9efef277c057d2c9ad22278e19a4e080487d90b483fa7d91866539b8
-
SHA512
31644a2be633bf26e3c86c760c2b87fde4f7fce15afcc60c601777147643e89b112bfbe0b184721e262ea4f314a71471c2dc26e35302d2223ddb39d45ac8269c
-
SSDEEP
3072:LSfb5atc5fU3Mdasu2F5LmnlzVUsfAgYo0i+8ZWFYzf5IszzOXRncPG5:Lsje6uILmzUHgDY80GfeazOXpH
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2248 d4484acf2ddbaa23f052e43c1d36250b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1364 2248 d4484acf2ddbaa23f052e43c1d36250b.exe 21 PID 2248 wrote to memory of 1364 2248 d4484acf2ddbaa23f052e43c1d36250b.exe 21 PID 2248 wrote to memory of 1364 2248 d4484acf2ddbaa23f052e43c1d36250b.exe 21 PID 2248 wrote to memory of 1364 2248 d4484acf2ddbaa23f052e43c1d36250b.exe 21 PID 2248 wrote to memory of 1364 2248 d4484acf2ddbaa23f052e43c1d36250b.exe 21 PID 2248 wrote to memory of 1364 2248 d4484acf2ddbaa23f052e43c1d36250b.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\d4484acf2ddbaa23f052e43c1d36250b.exe"C:\Users\Admin\AppData\Local\Temp\d4484acf2ddbaa23f052e43c1d36250b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248
-