Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:52
Static task
static1
Behavioral task
behavioral1
Sample
e329ddbad242dbda6240ba92258f001248810d5e62b7a95613727639a9f63c22.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e329ddbad242dbda6240ba92258f001248810d5e62b7a95613727639a9f63c22.exe
Resource
win10v2004-20221111-en
General
-
Target
e329ddbad242dbda6240ba92258f001248810d5e62b7a95613727639a9f63c22.exe
-
Size
528KB
-
MD5
f3c129c87a745a9678149414347985d5
-
SHA1
0cf8e894b84796acc015b7efb2d2706a4b3e0776
-
SHA256
e329ddbad242dbda6240ba92258f001248810d5e62b7a95613727639a9f63c22
-
SHA512
e69c3b95b640985b3950332cbfdc6546f1d296b976e006cf7a1c16bcb385f5873f8cc3225d05869a456405f59c4c3024e248d4f1e61eb0f22d5aa32edeaddcec
-
SSDEEP
12288:nCKlX6m7Ggkp2iE10wh2DhqpnAToZlQm:n6gkp2iU0wS8lQm
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
e329ddbad242dbda6240ba92258f001248810d5e62b7a95613727639a9f63c22.exedescription pid process target process PID 1292 wrote to memory of 2012 1292 e329ddbad242dbda6240ba92258f001248810d5e62b7a95613727639a9f63c22.exe e329ddbad242dbda6240ba92258f001248810d5e62b7a95613727639a9f63c22.exe PID 1292 wrote to memory of 2012 1292 e329ddbad242dbda6240ba92258f001248810d5e62b7a95613727639a9f63c22.exe e329ddbad242dbda6240ba92258f001248810d5e62b7a95613727639a9f63c22.exe PID 1292 wrote to memory of 2012 1292 e329ddbad242dbda6240ba92258f001248810d5e62b7a95613727639a9f63c22.exe e329ddbad242dbda6240ba92258f001248810d5e62b7a95613727639a9f63c22.exe PID 1292 wrote to memory of 2012 1292 e329ddbad242dbda6240ba92258f001248810d5e62b7a95613727639a9f63c22.exe e329ddbad242dbda6240ba92258f001248810d5e62b7a95613727639a9f63c22.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e329ddbad242dbda6240ba92258f001248810d5e62b7a95613727639a9f63c22.exe"C:\Users\Admin\AppData\Local\Temp\e329ddbad242dbda6240ba92258f001248810d5e62b7a95613727639a9f63c22.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\e329ddbad242dbda6240ba92258f001248810d5e62b7a95613727639a9f63c22.exetear2⤵PID:2012