Analysis
-
max time kernel
37s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:07
Static task
static1
Behavioral task
behavioral1
Sample
796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe
Resource
win10v2004-20220812-en
General
-
Target
796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe
-
Size
522KB
-
MD5
07fb722f2d9ed1ea6333f116c666731b
-
SHA1
1fb60e289f93207147f588d89664ba9d804624e7
-
SHA256
796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f
-
SHA512
822571e26032e71ea18bd237d5bbde770c9648dfc2f2691f6c4bec8365c192b5854c7d40b40a1b40a69a111b0a54e2e0b9956c9ba43428188e638ca2a9015ca1
-
SSDEEP
12288:ujn+Jl9OeDDDJr3FhwrpuJ20y18xQqpx8O5zG:w+ljJXwc20atqpx8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exedescription pid process target process PID 1976 wrote to memory of 1860 1976 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe PID 1976 wrote to memory of 1860 1976 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe PID 1976 wrote to memory of 1860 1976 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe PID 1976 wrote to memory of 1860 1976 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe PID 1976 wrote to memory of 1860 1976 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe PID 1976 wrote to memory of 1860 1976 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe PID 1976 wrote to memory of 1860 1976 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe PID 1976 wrote to memory of 2000 1976 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe PID 1976 wrote to memory of 2000 1976 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe PID 1976 wrote to memory of 2000 1976 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe PID 1976 wrote to memory of 2000 1976 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe PID 1976 wrote to memory of 2000 1976 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe PID 1976 wrote to memory of 2000 1976 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe PID 1976 wrote to memory of 2000 1976 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe 796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe"C:\Users\Admin\AppData\Local\Temp\796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exestart2⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\796ea36b538dab59d4e438357d9cf1c74b9368eef2ac2c500534990da795cf4f.exewatch2⤵PID:2000