Analysis
-
max time kernel
2s -
max time network
7s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-08-2024 21:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
medusa.ac 7 25 2024/medusa.ac_injector.exe
Resource
win11-20240802-en
windows11-21h2-x64
1 signatures
150 seconds
General
-
Target
medusa.ac 7 25 2024/medusa.ac_injector.exe
-
Size
10KB
-
MD5
53c3ab00f0b9d4f1446ffab27fe0724e
-
SHA1
9218a42b63e79f4cddcc8090caf0f6f17883a08b
-
SHA256
2a34c894ecf15bb7fbe12053f45ffd808bca8dc0fc0526d49c0ed526445f4c65
-
SHA512
8f12365604597e81c255c48bc8d41f8295e93cc0690c695aedb109fdc6e126fc6be1ce2abee7295546dc6e8c960dc611976ca1e8495802d02587836143c500f9
-
SSDEEP
192:BeF7foyPLXoceWqoxtQ8rPM4F4j8af4ntLZM7nL:0FjogYcXzxfz2XGMDL
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
medusa.ac_injector.exedescription pid process target process PID 1440 wrote to memory of 4016 1440 medusa.ac_injector.exe cmd.exe PID 1440 wrote to memory of 4016 1440 medusa.ac_injector.exe cmd.exe