Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 21:20
Behavioral task
behavioral1
Sample
9cf676141b7d305df5a9237c01e15138246392b0941657b55b3427776b7899d3.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
9cf676141b7d305df5a9237c01e15138246392b0941657b55b3427776b7899d3.exe
Resource
win11-20240704-en
General
-
Target
9cf676141b7d305df5a9237c01e15138246392b0941657b55b3427776b7899d3.exe
-
Size
5.7MB
-
MD5
5d6e9c5b2573d7cd51cb38247e37ece5
-
SHA1
2ac05b0f945ca59159096ff484c414b1e4797348
-
SHA256
9cf676141b7d305df5a9237c01e15138246392b0941657b55b3427776b7899d3
-
SHA512
bb24e89f5bf43f4ae7ab1025cd2cfc12857909d02ae5d4f0f6c4902fb0f178261f926ee1218bbb8531cf679b119e1d45e6694229e80c0a73be5b7fbe22e0d686
-
SSDEEP
98304:c18rMvo17k+/CMlt7bkDUc6/4y8hOncbWpzFtVH4bGLWobNLWwYSVwkPpjPPn8xy:cSko1jCCBreOcMzFX4GLPbYrkPhPf8x
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3572-0-0x0000000000E00000-0x0000000001E25000-memory.dmp upx behavioral1/memory/3572-1-0x0000000000E00000-0x0000000001E25000-memory.dmp upx behavioral1/memory/1412-2-0x0000000000E00000-0x0000000001E25000-memory.dmp upx behavioral1/memory/1412-3-0x0000000000E00000-0x0000000001E25000-memory.dmp upx behavioral1/memory/1412-5-0x0000000000E00000-0x0000000001E25000-memory.dmp upx behavioral1/memory/1412-7-0x0000000000E00000-0x0000000001E25000-memory.dmp upx behavioral1/memory/1412-10-0x0000000000E00000-0x0000000001E25000-memory.dmp upx behavioral1/memory/1412-11-0x0000000000E00000-0x0000000001E25000-memory.dmp upx behavioral1/memory/1412-13-0x0000000000E00000-0x0000000001E25000-memory.dmp upx behavioral1/memory/1412-14-0x0000000000E00000-0x0000000001E25000-memory.dmp upx behavioral1/memory/1412-16-0x0000000000E00000-0x0000000001E25000-memory.dmp upx behavioral1/memory/1412-17-0x0000000000E00000-0x0000000001E25000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3572 9cf676141b7d305df5a9237c01e15138246392b0941657b55b3427776b7899d3.exe 1412 9cf676141b7d305df5a9237c01e15138246392b0941657b55b3427776b7899d3.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3572 wrote to memory of 1412 3572 9cf676141b7d305df5a9237c01e15138246392b0941657b55b3427776b7899d3.exe 86 PID 3572 wrote to memory of 1412 3572 9cf676141b7d305df5a9237c01e15138246392b0941657b55b3427776b7899d3.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cf676141b7d305df5a9237c01e15138246392b0941657b55b3427776b7899d3.exe"C:\Users\Admin\AppData\Local\Temp\9cf676141b7d305df5a9237c01e15138246392b0941657b55b3427776b7899d3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\9cf676141b7d305df5a9237c01e15138246392b0941657b55b3427776b7899d3.exeC:\Users\Admin\AppData\Local\Temp\9cf676141b7d305df5a9237c01e15138246392b0941657b55b3427776b7899d3.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412
-