Analysis
-
max time kernel
42s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:06
Static task
static1
Behavioral task
behavioral1
Sample
7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe
Resource
win10v2004-20221111-en
General
-
Target
7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe
-
Size
522KB
-
MD5
218fbc858dd50bc337ab35b28f6248db
-
SHA1
e0483691df3d7f2c50daf5db335ed0573dd7f242
-
SHA256
7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec
-
SHA512
4855bf7f2ed03db57f4cf87711d204a5d59e7022a342247be47ad3469f10f18cfc509435bb20a509bb03b0946985a2dc42e4ac1b7bf3ea7b6be8899a04c8c2d9
-
SSDEEP
12288:g6IVRIVrGUi1M1TkwYYlLPt5oKnWq3lbX:gL7qrRJ5lLPt5/WwX
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exedescription pid process target process PID 1452 wrote to memory of 1308 1452 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe PID 1452 wrote to memory of 1308 1452 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe PID 1452 wrote to memory of 1308 1452 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe PID 1452 wrote to memory of 1308 1452 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe PID 1452 wrote to memory of 1308 1452 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe PID 1452 wrote to memory of 1308 1452 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe PID 1452 wrote to memory of 1308 1452 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe PID 1452 wrote to memory of 2000 1452 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe PID 1452 wrote to memory of 2000 1452 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe PID 1452 wrote to memory of 2000 1452 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe PID 1452 wrote to memory of 2000 1452 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe PID 1452 wrote to memory of 2000 1452 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe PID 1452 wrote to memory of 2000 1452 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe PID 1452 wrote to memory of 2000 1452 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe 7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe"C:\Users\Admin\AppData\Local\Temp\7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exestart2⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\7b78bd63de0be7965101a3dd08e0d1bcacc33eaa4de1b416de0a2591b037d5ec.exewatch2⤵PID:2000