Analysis
-
max time kernel
39s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:56
Static task
static1
Behavioral task
behavioral1
Sample
bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe
Resource
win10v2004-20220812-en
General
-
Target
bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe
-
Size
522KB
-
MD5
baba641c8447500e56888d78318c4064
-
SHA1
f6e1899fee3f6959996225e2af4c7eca74050ebb
-
SHA256
bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6
-
SHA512
664bf9724d789b150994ee26ca0523776e32cba21bcf7ec112894714c09392dd2c152dbd52caca26fcd4028a56989375a8bf2fd3951005278ba179f94aba0a23
-
SSDEEP
12288:zF4j0EyqNM4iOIWVNsodLy18xQqpx8O59:5uKqAODVdRatqpx8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exedescription pid process target process PID 1120 wrote to memory of 2028 1120 bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe PID 1120 wrote to memory of 2028 1120 bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe PID 1120 wrote to memory of 2028 1120 bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe PID 1120 wrote to memory of 2028 1120 bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe PID 1120 wrote to memory of 2028 1120 bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe PID 1120 wrote to memory of 2028 1120 bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe PID 1120 wrote to memory of 2028 1120 bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe PID 1120 wrote to memory of 1796 1120 bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe PID 1120 wrote to memory of 1796 1120 bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe PID 1120 wrote to memory of 1796 1120 bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe PID 1120 wrote to memory of 1796 1120 bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe PID 1120 wrote to memory of 1796 1120 bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe PID 1120 wrote to memory of 1796 1120 bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe PID 1120 wrote to memory of 1796 1120 bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe"C:\Users\Admin\AppData\Local\Temp\bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exestart2⤵PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\bbf24c0cab7e83c04d8db43d720450a412307fb183b987c3be88e3a30c95c1b6.exewatch2⤵PID:1796
-