Analysis
-
max time kernel
35s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:47
Static task
static1
Behavioral task
behavioral1
Sample
ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe
Resource
win10v2004-20220812-en
General
-
Target
ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe
-
Size
518KB
-
MD5
17f9557a340311f4605e946de02733ce
-
SHA1
148d5d0ceef82f4eb27770acedc6542a83d34933
-
SHA256
ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc
-
SHA512
0cd8d23551ae71147c6ac14282872b06936299cec19c237acd4a9a07ac6d2f3de9a6d1e640b0f7bb3d942352866660a1975ca234e2f47a78087ffea168ad23ce
-
SSDEEP
12288:/EdFSGIAjw9j/Qc/mwYYlLPt5oKnWq3Wb:sNYR/Qc/HlLPt5/WD
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exedescription pid process target process PID 2000 wrote to memory of 1964 2000 ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe PID 2000 wrote to memory of 1964 2000 ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe PID 2000 wrote to memory of 1964 2000 ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe PID 2000 wrote to memory of 1964 2000 ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe PID 2000 wrote to memory of 1964 2000 ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe PID 2000 wrote to memory of 1964 2000 ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe PID 2000 wrote to memory of 1964 2000 ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe PID 2000 wrote to memory of 1432 2000 ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe PID 2000 wrote to memory of 1432 2000 ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe PID 2000 wrote to memory of 1432 2000 ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe PID 2000 wrote to memory of 1432 2000 ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe PID 2000 wrote to memory of 1432 2000 ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe PID 2000 wrote to memory of 1432 2000 ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe PID 2000 wrote to memory of 1432 2000 ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe"C:\Users\Admin\AppData\Local\Temp\ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exestart2⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\ff5eb2501cd5d8f83d8c24b59f1dc89ebe813af588230293b5ee0e4d1235e6bc.exewatch2⤵PID:1432