Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 07:39
Static task
static1
Behavioral task
behavioral1
Sample
60d5ef90aae4e351c45da459ad7fada2951e668e24e9deeab1e4fc33cac4b46b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
60d5ef90aae4e351c45da459ad7fada2951e668e24e9deeab1e4fc33cac4b46b.exe
Resource
win10v2004-20220901-en
General
-
Target
60d5ef90aae4e351c45da459ad7fada2951e668e24e9deeab1e4fc33cac4b46b.exe
-
Size
99KB
-
MD5
619452e80d4ae107a13dda17c6024d60
-
SHA1
0103751268efcd8d33e8978c08780ad48813b623
-
SHA256
60d5ef90aae4e351c45da459ad7fada2951e668e24e9deeab1e4fc33cac4b46b
-
SHA512
03fe255dfa617fa21568ec037258260c8612c9d64562a3d8869ce931f8bb6946da309e3c921db791a8c2c5d4d75dbe8ad9bd85fd2416931c4c1be1ffe80fd2cf
-
SSDEEP
1536:QE2HLGl1fYeAHWQlgYO9XRV9GzfS3vMEQAhD9+dRzuOXGsc1b/q:X2kEHWQlgYO9XRVgzfqv+dNuO+1by
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1688 1468 60d5ef90aae4e351c45da459ad7fada2951e668e24e9deeab1e4fc33cac4b46b.exe 27 PID 1468 wrote to memory of 1688 1468 60d5ef90aae4e351c45da459ad7fada2951e668e24e9deeab1e4fc33cac4b46b.exe 27 PID 1468 wrote to memory of 1688 1468 60d5ef90aae4e351c45da459ad7fada2951e668e24e9deeab1e4fc33cac4b46b.exe 27 PID 1468 wrote to memory of 1688 1468 60d5ef90aae4e351c45da459ad7fada2951e668e24e9deeab1e4fc33cac4b46b.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\60d5ef90aae4e351c45da459ad7fada2951e668e24e9deeab1e4fc33cac4b46b.exe"C:\Users\Admin\AppData\Local\Temp\60d5ef90aae4e351c45da459ad7fada2951e668e24e9deeab1e4fc33cac4b46b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 4242⤵PID:1688
-