Analysis
-
max time kernel
18s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
22/11/2022, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe
Resource
win10v2004-20220812-en
General
-
Target
2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe
-
Size
522KB
-
MD5
9a6a90f678457f2ac0aa2971b1903917
-
SHA1
b61c35c767740ebdef7d1b495c466d2de27fcb03
-
SHA256
2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda
-
SHA512
c453e39a61c7673ebe66d63003813422f75c617048953f51886e93f8467977cffcaaa827454b784c2cee6ccc5351eeb9adddd1b3bf491ed8678d434c13799355
-
SSDEEP
6144:N1z3IACOKVYWykuf5WLfYqDFQVfY/4t2aQoq0EeJlw75G9+lLPX9MM8e459KOoWw:LEyKooJiVgw4a1JwYYlLPt5oKnWq3Tbt
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 364 wrote to memory of 1716 364 2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe 28 PID 364 wrote to memory of 1716 364 2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe 28 PID 364 wrote to memory of 1716 364 2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe 28 PID 364 wrote to memory of 1716 364 2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe 28 PID 364 wrote to memory of 1716 364 2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe 28 PID 364 wrote to memory of 1716 364 2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe 28 PID 364 wrote to memory of 1716 364 2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe 28 PID 364 wrote to memory of 952 364 2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe 29 PID 364 wrote to memory of 952 364 2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe 29 PID 364 wrote to memory of 952 364 2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe 29 PID 364 wrote to memory of 952 364 2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe 29 PID 364 wrote to memory of 952 364 2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe 29 PID 364 wrote to memory of 952 364 2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe 29 PID 364 wrote to memory of 952 364 2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe"C:\Users\Admin\AppData\Local\Temp\2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exestart2⤵PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\2c5b2d1d37a89648501decccc1b08832e6318d43ac557d709fe10e3cd8fa3bda.exewatch2⤵PID:952
-