Analysis
-
max time kernel
39s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 21:39
Static task
static1
Behavioral task
behavioral1
Sample
9f3c56f0fbed0ee589c0597f7b607f644a0152ea8c530b9fe4d0c3392403c973.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9f3c56f0fbed0ee589c0597f7b607f644a0152ea8c530b9fe4d0c3392403c973.exe
Resource
win10v2004-20220812-en
General
-
Target
9f3c56f0fbed0ee589c0597f7b607f644a0152ea8c530b9fe4d0c3392403c973.exe
-
Size
296KB
-
MD5
8397f90d19b35f7a3b695149c7eed5f0
-
SHA1
dc487bd48e8fc832be8780b664f40ff5076eea3f
-
SHA256
9f3c56f0fbed0ee589c0597f7b607f644a0152ea8c530b9fe4d0c3392403c973
-
SHA512
6a7220918a6dddd339bad76dd280e364eb012b1c62e872bd1ca42a5258950c1826291f6297d4ac5e4636371b8412d54ddd00ee2fba83335140bec922f290d99c
-
SSDEEP
6144:si15mEZ06B1UEmmCaee8RiXTp52U8bgovGf1uCMeo:sq5mC03naN1XfoY1uF
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1516 2020 9f3c56f0fbed0ee589c0597f7b607f644a0152ea8c530b9fe4d0c3392403c973.exe 26 PID 2020 wrote to memory of 1516 2020 9f3c56f0fbed0ee589c0597f7b607f644a0152ea8c530b9fe4d0c3392403c973.exe 26 PID 2020 wrote to memory of 1516 2020 9f3c56f0fbed0ee589c0597f7b607f644a0152ea8c530b9fe4d0c3392403c973.exe 26 PID 2020 wrote to memory of 1516 2020 9f3c56f0fbed0ee589c0597f7b607f644a0152ea8c530b9fe4d0c3392403c973.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f3c56f0fbed0ee589c0597f7b607f644a0152ea8c530b9fe4d0c3392403c973.exe"C:\Users\Admin\AppData\Local\Temp\9f3c56f0fbed0ee589c0597f7b607f644a0152ea8c530b9fe4d0c3392403c973.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\9f3c56f0fbed0ee589c0597f7b607f644a0152ea8c530b9fe4d0c3392403c973.exetear2⤵PID:1516
-