Analysis
-
max time kernel
55s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08-11-2022 05:23
Static task
static1
Behavioral task
behavioral1
Sample
aa2ebb9abf516d6a530683727d18aea01fab4698d908904fc8e622fec00a8aca.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
General
-
Target
aa2ebb9abf516d6a530683727d18aea01fab4698d908904fc8e622fec00a8aca.exe
-
Size
97KB
-
MD5
0912d7f53812a0ab61e0c1001eb107f0
-
SHA1
a9f1039a88b5ccd210c9dbf227ea23bcb562993d
-
SHA256
aa2ebb9abf516d6a530683727d18aea01fab4698d908904fc8e622fec00a8aca
-
SHA512
aa21ee7607c8d928550ef9cd47638f65ecade923629d072fe91bd9a0a6e23853eb585d75917273ef7104e91f2da032db736764d3d1f09124e2bec92332049f7f
-
SSDEEP
3072:7W+EGGxgfhI/5KOEwvDRRVkT6KsRPKfXE:7NhyuhIBpRRVgsRP2
Malware Config
Extracted
Family
gootkit
Botnet
1001
C2
pell-talak.com
gudsline.com
Attributes
-
vendor_id
1001
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
aa2ebb9abf516d6a530683727d18aea01fab4698d908904fc8e622fec00a8aca.exedescription pid process target process PID 240 wrote to memory of 1756 240 aa2ebb9abf516d6a530683727d18aea01fab4698d908904fc8e622fec00a8aca.exe aa2ebb9abf516d6a530683727d18aea01fab4698d908904fc8e622fec00a8aca.exe PID 240 wrote to memory of 1756 240 aa2ebb9abf516d6a530683727d18aea01fab4698d908904fc8e622fec00a8aca.exe aa2ebb9abf516d6a530683727d18aea01fab4698d908904fc8e622fec00a8aca.exe PID 240 wrote to memory of 1756 240 aa2ebb9abf516d6a530683727d18aea01fab4698d908904fc8e622fec00a8aca.exe aa2ebb9abf516d6a530683727d18aea01fab4698d908904fc8e622fec00a8aca.exe PID 240 wrote to memory of 1756 240 aa2ebb9abf516d6a530683727d18aea01fab4698d908904fc8e622fec00a8aca.exe aa2ebb9abf516d6a530683727d18aea01fab4698d908904fc8e622fec00a8aca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa2ebb9abf516d6a530683727d18aea01fab4698d908904fc8e622fec00a8aca.exe"C:\Users\Admin\AppData\Local\Temp\aa2ebb9abf516d6a530683727d18aea01fab4698d908904fc8e622fec00a8aca.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Users\Admin\AppData\Local\Temp\aa2ebb9abf516d6a530683727d18aea01fab4698d908904fc8e622fec00a8aca.exe"C:\Users\Admin\AppData\Local\Temp\aa2ebb9abf516d6a530683727d18aea01fab4698d908904fc8e622fec00a8aca.exe" kxmxvrnolckvzblfjuop2⤵PID:1756
-