Analysis
-
max time kernel
34s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 06:55
Static task
static1
Behavioral task
behavioral1
Sample
c686bdfbb6cef2a96a1b409a16a2c895b5646408ac1eadfeb2a127a9dd711221.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c686bdfbb6cef2a96a1b409a16a2c895b5646408ac1eadfeb2a127a9dd711221.exe
Resource
win10v2004-20220812-en
General
-
Target
c686bdfbb6cef2a96a1b409a16a2c895b5646408ac1eadfeb2a127a9dd711221.exe
-
Size
572KB
-
MD5
658f6f1f22f0801bc6031a40391c07a1
-
SHA1
1efd40cba02a3de7fee6064ea8e378955aa961bf
-
SHA256
c686bdfbb6cef2a96a1b409a16a2c895b5646408ac1eadfeb2a127a9dd711221
-
SHA512
b9e9053c41cc8be51b709bd64a35a027303e0ce434badcd00d4afba70d5653233e0df16105fc37b8048001acb410625fe40b1d3942f00960eb6044cc60ed986d
-
SSDEEP
12288:6XgPVmsO7H+JeYkZQors8sEyMGXxedlX4EEPSwDfAmgBJbS:AoZ3J78GCX4bEmCbS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1620 cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 364 wrote to memory of 1620 364 c686bdfbb6cef2a96a1b409a16a2c895b5646408ac1eadfeb2a127a9dd711221.exe 26 PID 364 wrote to memory of 1620 364 c686bdfbb6cef2a96a1b409a16a2c895b5646408ac1eadfeb2a127a9dd711221.exe 26 PID 364 wrote to memory of 1620 364 c686bdfbb6cef2a96a1b409a16a2c895b5646408ac1eadfeb2a127a9dd711221.exe 26 PID 364 wrote to memory of 1620 364 c686bdfbb6cef2a96a1b409a16a2c895b5646408ac1eadfeb2a127a9dd711221.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\c686bdfbb6cef2a96a1b409a16a2c895b5646408ac1eadfeb2a127a9dd711221.exe"C:\Users\Admin\AppData\Local\Temp\c686bdfbb6cef2a96a1b409a16a2c895b5646408ac1eadfeb2a127a9dd711221.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\cmd.execmd /c del c686bdfbb6cef2a96a1b409a16a2c895b5646408ac1eadfeb2a127a9dd711221.exe2⤵
- Deletes itself
PID:1620
-