Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:05
Static task
static1
Behavioral task
behavioral1
Sample
26046409c44a0c9d9d10b7b8802095fb2d1b80d2f37a0b92e4152c5dd62155d9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
26046409c44a0c9d9d10b7b8802095fb2d1b80d2f37a0b92e4152c5dd62155d9.exe
Resource
win10v2004-20220812-en
General
-
Target
26046409c44a0c9d9d10b7b8802095fb2d1b80d2f37a0b92e4152c5dd62155d9.exe
-
Size
528KB
-
MD5
30b3188f3d24f13a98d95694e25decef
-
SHA1
4bf8e570185198ee18cd76afe66d22b4345a395c
-
SHA256
26046409c44a0c9d9d10b7b8802095fb2d1b80d2f37a0b92e4152c5dd62155d9
-
SHA512
e802ce8a38035f703ccd345b45c906fc8357a6a9f2caa4993cf65aece6e4db59fa67e3ddde021fc1b8a3627734c3d3f3c4bf5238bc6bcb37dc7f69fe129ad385
-
SSDEEP
12288:nJj+cE+g2INGrdQqIDBFqqEyBbzvXETJn5k9qTls:a2IYOquFLbTUk
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
26046409c44a0c9d9d10b7b8802095fb2d1b80d2f37a0b92e4152c5dd62155d9.exedescription pid process target process PID 1976 wrote to memory of 1676 1976 26046409c44a0c9d9d10b7b8802095fb2d1b80d2f37a0b92e4152c5dd62155d9.exe 26046409c44a0c9d9d10b7b8802095fb2d1b80d2f37a0b92e4152c5dd62155d9.exe PID 1976 wrote to memory of 1676 1976 26046409c44a0c9d9d10b7b8802095fb2d1b80d2f37a0b92e4152c5dd62155d9.exe 26046409c44a0c9d9d10b7b8802095fb2d1b80d2f37a0b92e4152c5dd62155d9.exe PID 1976 wrote to memory of 1676 1976 26046409c44a0c9d9d10b7b8802095fb2d1b80d2f37a0b92e4152c5dd62155d9.exe 26046409c44a0c9d9d10b7b8802095fb2d1b80d2f37a0b92e4152c5dd62155d9.exe PID 1976 wrote to memory of 1676 1976 26046409c44a0c9d9d10b7b8802095fb2d1b80d2f37a0b92e4152c5dd62155d9.exe 26046409c44a0c9d9d10b7b8802095fb2d1b80d2f37a0b92e4152c5dd62155d9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\26046409c44a0c9d9d10b7b8802095fb2d1b80d2f37a0b92e4152c5dd62155d9.exe"C:\Users\Admin\AppData\Local\Temp\26046409c44a0c9d9d10b7b8802095fb2d1b80d2f37a0b92e4152c5dd62155d9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\26046409c44a0c9d9d10b7b8802095fb2d1b80d2f37a0b92e4152c5dd62155d9.exetear2⤵PID:1676