Analysis
-
max time kernel
28s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:05
Static task
static1
Behavioral task
behavioral1
Sample
9dab7d6ca9a05231a36eefa276b5154b10b6e0467b0cf50939f91911791313e8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9dab7d6ca9a05231a36eefa276b5154b10b6e0467b0cf50939f91911791313e8.exe
Resource
win10v2004-20220901-en
General
-
Target
9dab7d6ca9a05231a36eefa276b5154b10b6e0467b0cf50939f91911791313e8.exe
-
Size
524KB
-
MD5
c12b58894b0fcb14eeb1b0c0a2f091c5
-
SHA1
0c0b5858ac34eb73b69fd50526beba42d1bbc027
-
SHA256
9dab7d6ca9a05231a36eefa276b5154b10b6e0467b0cf50939f91911791313e8
-
SHA512
c5a1305f912848c86bc48697c0779b062f7e55cbb529cfd21475c651e822e358414c0a05dd3d6317a42f8ecbd7bfbc24f515c74c1db0094000be3b0aa8ea4f40
-
SSDEEP
12288:qPT6jD9wCb+cvkUxY7FqqEyBbzvXETJn5k9q4l:pl5vz+FLbTU
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
9dab7d6ca9a05231a36eefa276b5154b10b6e0467b0cf50939f91911791313e8.exedescription pid process target process PID 1612 wrote to memory of 1676 1612 9dab7d6ca9a05231a36eefa276b5154b10b6e0467b0cf50939f91911791313e8.exe 9dab7d6ca9a05231a36eefa276b5154b10b6e0467b0cf50939f91911791313e8.exe PID 1612 wrote to memory of 1676 1612 9dab7d6ca9a05231a36eefa276b5154b10b6e0467b0cf50939f91911791313e8.exe 9dab7d6ca9a05231a36eefa276b5154b10b6e0467b0cf50939f91911791313e8.exe PID 1612 wrote to memory of 1676 1612 9dab7d6ca9a05231a36eefa276b5154b10b6e0467b0cf50939f91911791313e8.exe 9dab7d6ca9a05231a36eefa276b5154b10b6e0467b0cf50939f91911791313e8.exe PID 1612 wrote to memory of 1676 1612 9dab7d6ca9a05231a36eefa276b5154b10b6e0467b0cf50939f91911791313e8.exe 9dab7d6ca9a05231a36eefa276b5154b10b6e0467b0cf50939f91911791313e8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9dab7d6ca9a05231a36eefa276b5154b10b6e0467b0cf50939f91911791313e8.exe"C:\Users\Admin\AppData\Local\Temp\9dab7d6ca9a05231a36eefa276b5154b10b6e0467b0cf50939f91911791313e8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\9dab7d6ca9a05231a36eefa276b5154b10b6e0467b0cf50939f91911791313e8.exetear2⤵PID:1676