Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 06:50
Static task
static1
Behavioral task
behavioral1
Sample
335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe
Resource
win10v2004-20220812-en
General
-
Target
335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe
-
Size
526KB
-
MD5
2ff1e66e32d10e31bc29c5a98408e410
-
SHA1
4b232a809b0e0216a1840c1d8a4bfe8fa632bb2a
-
SHA256
335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3
-
SHA512
8a7d63a3effbe4f2941c45a2f917e153efb364d8d7d8645f57736ced4870299581dbdb4b01f968bcebd92a67bc93a652154abd95d0838337bfcdb9ff2e1a87a0
-
SSDEEP
12288:91+wedogwBbbPxNPFa8TdNq8lZaHuBw4B4M41:LwdogwxPv135lkHuGC4d1
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exedescription pid process target process PID 2028 wrote to memory of 948 2028 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe PID 2028 wrote to memory of 948 2028 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe PID 2028 wrote to memory of 948 2028 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe PID 2028 wrote to memory of 948 2028 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe PID 2028 wrote to memory of 948 2028 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe PID 2028 wrote to memory of 948 2028 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe PID 2028 wrote to memory of 948 2028 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe PID 2028 wrote to memory of 2012 2028 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe PID 2028 wrote to memory of 2012 2028 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe PID 2028 wrote to memory of 2012 2028 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe PID 2028 wrote to memory of 2012 2028 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe PID 2028 wrote to memory of 2012 2028 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe PID 2028 wrote to memory of 2012 2028 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe PID 2028 wrote to memory of 2012 2028 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe 335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe"C:\Users\Admin\AppData\Local\Temp\335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exestart2⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\335534931ca22949fc0dcb511ae5e8e286f8932f78a70ee723ab78bff11bd2d3.exewatch2⤵PID:2012