Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:05
Static task
static1
Behavioral task
behavioral1
Sample
65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exe
Resource
win10v2004-20221111-en
General
-
Target
65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exe
-
Size
528KB
-
MD5
d2baae5d1bf8a26c23f625ce66fc79be
-
SHA1
84e956020c81a0b1d5758237f28f852770a3be5a
-
SHA256
65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2
-
SHA512
f62f8fae931fd452e8c354fb700e8e9b856f69f9afec17539527f968c2a565045ec5435147edfd97c79b022758dd53df43f6b8f2721c75ae71f27127404f9e00
-
SSDEEP
12288:wNwmpCAmAdCCFIuFqqEyBbzvXETJn5k9qXlhT:T+JtFLbTUxT
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exedescription pid process target process PID 1248 wrote to memory of 1180 1248 65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exe 65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exe PID 1248 wrote to memory of 1180 1248 65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exe 65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exe PID 1248 wrote to memory of 1180 1248 65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exe 65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exe PID 1248 wrote to memory of 1180 1248 65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exe 65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exe"C:\Users\Admin\AppData\Local\Temp\65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exetear2⤵PID:1180