Analysis
-
max time kernel
151s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
6ac855d4f9089ecca12568b752fc827a2192c49f8aa85ef84f4f1214942d6823.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6ac855d4f9089ecca12568b752fc827a2192c49f8aa85ef84f4f1214942d6823.exe
Resource
win10v2004-20220812-en
General
-
Target
6ac855d4f9089ecca12568b752fc827a2192c49f8aa85ef84f4f1214942d6823.exe
-
Size
91KB
-
MD5
06b47d3035c00ee526d8ca95ad407029
-
SHA1
f9f3d305159c5d508d38167ff4aca0c98974ce05
-
SHA256
6ac855d4f9089ecca12568b752fc827a2192c49f8aa85ef84f4f1214942d6823
-
SHA512
cb0e4e2218a486901ffd3b732f50c45d3c794c65bc42e9b309785977fe62668aa5a3f23a30fc7225319ff7bb11930b00dc614dda02c94c044e0d366c0c63df42
-
SSDEEP
1536:ZDvPiWPu8pcA1lHtIFtrNqXGlhvdrtWPPHIiSF0r6rh6lus7+GS/zoXqlZwCPF7K:rWYNWtrNyIzp+7SF2ch6luqmbJHwCxNQ
Malware Config
Signatures
-
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1644 6ac855d4f9089ecca12568b752fc827a2192c49f8aa85ef84f4f1214942d6823.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1644 wrote to memory of 1324 1644 6ac855d4f9089ecca12568b752fc827a2192c49f8aa85ef84f4f1214942d6823.exe 28 PID 1644 wrote to memory of 1324 1644 6ac855d4f9089ecca12568b752fc827a2192c49f8aa85ef84f4f1214942d6823.exe 28 PID 1644 wrote to memory of 1324 1644 6ac855d4f9089ecca12568b752fc827a2192c49f8aa85ef84f4f1214942d6823.exe 28 PID 1644 wrote to memory of 1324 1644 6ac855d4f9089ecca12568b752fc827a2192c49f8aa85ef84f4f1214942d6823.exe 28 PID 1644 wrote to memory of 1324 1644 6ac855d4f9089ecca12568b752fc827a2192c49f8aa85ef84f4f1214942d6823.exe 28 PID 1644 wrote to memory of 1324 1644 6ac855d4f9089ecca12568b752fc827a2192c49f8aa85ef84f4f1214942d6823.exe 28 PID 1644 wrote to memory of 1324 1644 6ac855d4f9089ecca12568b752fc827a2192c49f8aa85ef84f4f1214942d6823.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ac855d4f9089ecca12568b752fc827a2192c49f8aa85ef84f4f1214942d6823.exe"C:\Users\Admin\AppData\Local\Temp\6ac855d4f9089ecca12568b752fc827a2192c49f8aa85ef84f4f1214942d6823.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:1324
-