Analysis
-
max time kernel
153s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 00:57
Static task
static1
Behavioral task
behavioral1
Sample
fe693f22032b243e1d387004ea3898d1578ee3fa76a97c7cc2548e70c0727f4e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe693f22032b243e1d387004ea3898d1578ee3fa76a97c7cc2548e70c0727f4e.exe
Resource
win10v2004-20220812-en
General
-
Target
fe693f22032b243e1d387004ea3898d1578ee3fa76a97c7cc2548e70c0727f4e.exe
-
Size
89KB
-
MD5
03214345fdfe85fe9698d2b7d276d586
-
SHA1
a1606b4ffd0ed5724cdc00db7cd2cc3ac51ebf35
-
SHA256
fe693f22032b243e1d387004ea3898d1578ee3fa76a97c7cc2548e70c0727f4e
-
SHA512
5193966f889a7cf9d284fc7d7c66be697e0e48859f6f45fbe6e884305fe7fddcb22e7a4e8f3c079c95a656d28fd01101e8eb0675f5a706d80ee629a9a972c766
-
SSDEEP
1536:OME12hzQljlIMZomtpaUjDsSKM5N7qWsTP8aPi9DOXWuDy6F5DgJZ5:OgSXom7RsSKM5N+gU5XPDpLwZ5
Malware Config
Signatures
-
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1436 fe693f22032b243e1d387004ea3898d1578ee3fa76a97c7cc2548e70c0727f4e.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1436 wrote to memory of 1032 1436 fe693f22032b243e1d387004ea3898d1578ee3fa76a97c7cc2548e70c0727f4e.exe 27 PID 1436 wrote to memory of 1032 1436 fe693f22032b243e1d387004ea3898d1578ee3fa76a97c7cc2548e70c0727f4e.exe 27 PID 1436 wrote to memory of 1032 1436 fe693f22032b243e1d387004ea3898d1578ee3fa76a97c7cc2548e70c0727f4e.exe 27 PID 1436 wrote to memory of 1032 1436 fe693f22032b243e1d387004ea3898d1578ee3fa76a97c7cc2548e70c0727f4e.exe 27 PID 1436 wrote to memory of 1032 1436 fe693f22032b243e1d387004ea3898d1578ee3fa76a97c7cc2548e70c0727f4e.exe 27 PID 1436 wrote to memory of 1032 1436 fe693f22032b243e1d387004ea3898d1578ee3fa76a97c7cc2548e70c0727f4e.exe 27 PID 1436 wrote to memory of 1032 1436 fe693f22032b243e1d387004ea3898d1578ee3fa76a97c7cc2548e70c0727f4e.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe693f22032b243e1d387004ea3898d1578ee3fa76a97c7cc2548e70c0727f4e.exe"C:\Users\Admin\AppData\Local\Temp\fe693f22032b243e1d387004ea3898d1578ee3fa76a97c7cc2548e70c0727f4e.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:1032
-