Analysis
-
max time kernel
427s -
max time network
431s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27/10/2022, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
8c6477d2457a28f715a34e9501d2bf06a17518adefb65910fd644543d91f472f_unpacked.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8c6477d2457a28f715a34e9501d2bf06a17518adefb65910fd644543d91f472f_unpacked.exe
Resource
win10v2004-20220812-en
General
-
Target
8c6477d2457a28f715a34e9501d2bf06a17518adefb65910fd644543d91f472f_unpacked.exe
-
Size
124KB
-
MD5
b91344a1186930816070e8f8ee7b101f
-
SHA1
b5b1c5ad7875483bed35cf5ded55b4be157062c2
-
SHA256
25dd5de402dbcd1715b11d9946c64abfe8bf06ae1e4aa483233fb46594b84215
-
SHA512
572adb51c681ca9da16d530a649480d812e0d1cf6a4ba501bdf4592fcf7403423f4d86930fac7f63cd1b2d0cfe6b233a0104e11d08da63f122f929c45c667016
-
SSDEEP
3072:USmNvn/TnyFhkRuqzTmSkgGvm9cakCNKTU6TBf5PTh:USmN//TyezTjk8iJY6TBRP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1148 explorer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1148 1308 8c6477d2457a28f715a34e9501d2bf06a17518adefb65910fd644543d91f472f_unpacked.exe 27 PID 1308 wrote to memory of 1148 1308 8c6477d2457a28f715a34e9501d2bf06a17518adefb65910fd644543d91f472f_unpacked.exe 27 PID 1308 wrote to memory of 1148 1308 8c6477d2457a28f715a34e9501d2bf06a17518adefb65910fd644543d91f472f_unpacked.exe 27 PID 1308 wrote to memory of 1148 1308 8c6477d2457a28f715a34e9501d2bf06a17518adefb65910fd644543d91f472f_unpacked.exe 27 PID 1308 wrote to memory of 1148 1308 8c6477d2457a28f715a34e9501d2bf06a17518adefb65910fd644543d91f472f_unpacked.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c6477d2457a28f715a34e9501d2bf06a17518adefb65910fd644543d91f472f_unpacked.exe"C:\Users\Admin\AppData\Local\Temp\8c6477d2457a28f715a34e9501d2bf06a17518adefb65910fd644543d91f472f_unpacked.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- Deletes itself
PID:1148
-