Analysis
-
max time kernel
36s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 05:18
Static task
static1
Behavioral task
behavioral1
Sample
ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe
Resource
win10v2004-20220812-en
General
-
Target
ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe
-
Size
310KB
-
MD5
4d6836342d59ca4112c4eb4e1f14b9d0
-
SHA1
4e34682c2bce0b5f7969bf13547610204b970b3b
-
SHA256
ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674
-
SHA512
d661df6b98c3d640a34399a45ff14301828a8adc111f4db5c764aa3b1d0e1dc48f435862813b89aeeb69c86b9fb9ec335779179bce97061961dca9fbbcbaa45c
-
SSDEEP
6144:S1cZ0mzA+m5H32rr83YWGzDSHj9T6DRHvGhoiNtXoWm1mrsj9bKZlIW:S3ZVOr8FuKj9OlvGhDNtYWDS9+ZlI
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2020 1720 ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe 27 PID 1720 wrote to memory of 2020 1720 ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe 27 PID 1720 wrote to memory of 2020 1720 ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe 27 PID 1720 wrote to memory of 2020 1720 ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe 27 PID 1720 wrote to memory of 2020 1720 ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe 27 PID 1720 wrote to memory of 2020 1720 ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe 27 PID 1720 wrote to memory of 2020 1720 ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe"C:\Users\Admin\AppData\Local\Temp\ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exetear2⤵PID:2020
-