Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
cf44b818e01ce5da8b6bc34338191a3adeed5d0a05c7bcae9660ca30394b630f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf44b818e01ce5da8b6bc34338191a3adeed5d0a05c7bcae9660ca30394b630f.exe
Resource
win10v2004-20220901-en
General
-
Target
cf44b818e01ce5da8b6bc34338191a3adeed5d0a05c7bcae9660ca30394b630f.exe
-
Size
149KB
-
MD5
7c27c79d21d4d224e1f37e01d3422472
-
SHA1
ea3a90bf98265758e042d7b217f383e2505ce96f
-
SHA256
cf44b818e01ce5da8b6bc34338191a3adeed5d0a05c7bcae9660ca30394b630f
-
SHA512
450f3ace9ac1331db9beaaba65d472e6b846c3f568facca0ba1c9384585c1570c0332d457d332ad401a0e80ef8f261de1898f8e56008c14e92d9d28e97bcfaf6
-
SSDEEP
3072:0o2UJCAxI/iTEADsmxI7WhJy5toBptiDKWmdG9Y:b2UJCAxMizDsmxIWwtoBptiD3qMY
Malware Config
Signatures
-
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1424 cf44b818e01ce5da8b6bc34338191a3adeed5d0a05c7bcae9660ca30394b630f.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1260 1424 cf44b818e01ce5da8b6bc34338191a3adeed5d0a05c7bcae9660ca30394b630f.exe 13 PID 1424 wrote to memory of 1260 1424 cf44b818e01ce5da8b6bc34338191a3adeed5d0a05c7bcae9660ca30394b630f.exe 13
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\cf44b818e01ce5da8b6bc34338191a3adeed5d0a05c7bcae9660ca30394b630f.exe"C:\Users\Admin\AppData\Local\Temp\cf44b818e01ce5da8b6bc34338191a3adeed5d0a05c7bcae9660ca30394b630f.exe"2⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1424
-