Analysis
-
max time kernel
20s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:56
Static task
static1
Behavioral task
behavioral1
Sample
dbde306efc81df958b287631d765cea4fa2d0d0cfb6685fc94cfa2e507416343.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dbde306efc81df958b287631d765cea4fa2d0d0cfb6685fc94cfa2e507416343.exe
Resource
win10v2004-20221111-en
General
-
Target
dbde306efc81df958b287631d765cea4fa2d0d0cfb6685fc94cfa2e507416343.exe
-
Size
532KB
-
MD5
5c832d1901e59bdba5bc14035bf72c50
-
SHA1
36e9b86b50114ee50207acad7cf216f311d438bc
-
SHA256
dbde306efc81df958b287631d765cea4fa2d0d0cfb6685fc94cfa2e507416343
-
SHA512
34fb422f8f3cd50b8e62c5d5ca7ed1a0db280961699f6dafba93d9cde92fd4bb639c333bd229e8b1b961f2fbdaeeb5f1367a202e1aa67113fe3b96e6c55cd2fd
-
SSDEEP
12288:ignuMIJ5Pgaof0cUI+StwPh2RIbWcoIFFEgB9nP1Q:iguMIsvschtwp0IbWcoIFagbPS
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
dbde306efc81df958b287631d765cea4fa2d0d0cfb6685fc94cfa2e507416343.exedescription pid process target process PID 1352 wrote to memory of 956 1352 dbde306efc81df958b287631d765cea4fa2d0d0cfb6685fc94cfa2e507416343.exe dbde306efc81df958b287631d765cea4fa2d0d0cfb6685fc94cfa2e507416343.exe PID 1352 wrote to memory of 956 1352 dbde306efc81df958b287631d765cea4fa2d0d0cfb6685fc94cfa2e507416343.exe dbde306efc81df958b287631d765cea4fa2d0d0cfb6685fc94cfa2e507416343.exe PID 1352 wrote to memory of 956 1352 dbde306efc81df958b287631d765cea4fa2d0d0cfb6685fc94cfa2e507416343.exe dbde306efc81df958b287631d765cea4fa2d0d0cfb6685fc94cfa2e507416343.exe PID 1352 wrote to memory of 956 1352 dbde306efc81df958b287631d765cea4fa2d0d0cfb6685fc94cfa2e507416343.exe dbde306efc81df958b287631d765cea4fa2d0d0cfb6685fc94cfa2e507416343.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbde306efc81df958b287631d765cea4fa2d0d0cfb6685fc94cfa2e507416343.exe"C:\Users\Admin\AppData\Local\Temp\dbde306efc81df958b287631d765cea4fa2d0d0cfb6685fc94cfa2e507416343.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\dbde306efc81df958b287631d765cea4fa2d0d0cfb6685fc94cfa2e507416343.exetear2⤵PID:956