Analysis
-
max time kernel
36s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:56
Static task
static1
Behavioral task
behavioral1
Sample
bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe
Resource
win10v2004-20221111-en
General
-
Target
bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe
-
Size
518KB
-
MD5
dad66d78a35cd54bcaa7de8795f07a07
-
SHA1
61f105e243752f705201995f54ff90151ad82a84
-
SHA256
bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7
-
SHA512
e70b96a158fc2da0dc418af5df5144659f85312e076de0d22b97f96f4033cc050fbbaca86f938833a2b53033af233d401b59f7a418ffb5bbb27228834bb5d46b
-
SSDEEP
12288:aBBudCwJmj9jNAaDfUUHwYYlLPt5oKnWq3Sb:a+KpNPjqlLPt5/WL
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exedescription pid process target process PID 1232 wrote to memory of 1348 1232 bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe PID 1232 wrote to memory of 1348 1232 bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe PID 1232 wrote to memory of 1348 1232 bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe PID 1232 wrote to memory of 1348 1232 bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe PID 1232 wrote to memory of 1348 1232 bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe PID 1232 wrote to memory of 1348 1232 bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe PID 1232 wrote to memory of 1348 1232 bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe PID 1232 wrote to memory of 1248 1232 bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe PID 1232 wrote to memory of 1248 1232 bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe PID 1232 wrote to memory of 1248 1232 bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe PID 1232 wrote to memory of 1248 1232 bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe PID 1232 wrote to memory of 1248 1232 bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe PID 1232 wrote to memory of 1248 1232 bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe PID 1232 wrote to memory of 1248 1232 bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe"C:\Users\Admin\AppData\Local\Temp\bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exestart2⤵PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exewatch2⤵PID:1248
-