Analysis
-
max time kernel
171s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:15
Behavioral task
behavioral1
Sample
7432c8d86497240ebfbb57175c525cc0f1ddf08bc481010f2cf9b71267e64575.exe
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7432c8d86497240ebfbb57175c525cc0f1ddf08bc481010f2cf9b71267e64575.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
7432c8d86497240ebfbb57175c525cc0f1ddf08bc481010f2cf9b71267e64575.exe
-
Size
104KB
-
MD5
b426dd30f0ca049fc4c58e3e75ac3223
-
SHA1
cb42b2d1385d0d6d44c985d227e81f517aa05caa
-
SHA256
7432c8d86497240ebfbb57175c525cc0f1ddf08bc481010f2cf9b71267e64575
-
SHA512
548a8f90b1d17fd60b754573c68494a5d42a282a6a39f8435ac7e2537023de87f47223d32c4620a37de27127f62707ba7c3d99776b9b809762dd5d65331bd355
-
SSDEEP
3072:5c7BBkCJb0TgJAgxRuuI1A1ZiOFB/pksF:5SSCpbxE1A1ZiS/C
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4424-132-0x0000000000400000-0x0000000000432000-memory.dmp upx -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
7432c8d86497240ebfbb57175c525cc0f1ddf08bc481010f2cf9b71267e64575.exepid process 4424 7432c8d86497240ebfbb57175c525cc0f1ddf08bc481010f2cf9b71267e64575.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
7432c8d86497240ebfbb57175c525cc0f1ddf08bc481010f2cf9b71267e64575.exedescription pid process target process PID 4424 wrote to memory of 2708 4424 7432c8d86497240ebfbb57175c525cc0f1ddf08bc481010f2cf9b71267e64575.exe Explorer.EXE PID 4424 wrote to memory of 2708 4424 7432c8d86497240ebfbb57175c525cc0f1ddf08bc481010f2cf9b71267e64575.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\7432c8d86497240ebfbb57175c525cc0f1ddf08bc481010f2cf9b71267e64575.exe"C:\Users\Admin\AppData\Local\Temp\7432c8d86497240ebfbb57175c525cc0f1ddf08bc481010f2cf9b71267e64575.exe"2⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4424