Analysis
-
max time kernel
36s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:12
Static task
static1
Behavioral task
behavioral1
Sample
5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe
Resource
win10v2004-20220901-en
General
-
Target
5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe
-
Size
518KB
-
MD5
5c6f98fe2b564657d87e4c8494525ed5
-
SHA1
f10010d5af8a682fbe20dfe265ed6d4fcab77aa9
-
SHA256
5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7
-
SHA512
3206a43107c70df2cd6226224366363e4c058f3b44fc0749c74a35ef3dbd7c02181e5fbaeea8d67865ca92126f3e2bca4c4d94d9d3db440b4f1fc1ce645e0ea6
-
SSDEEP
12288:yEa3DDZmvUqDiju17wlXGlEYmF9QgkjwYYlLPt5oKnWq35b:yEaHZmct+yrF9CYlLPt5/W0
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exedescription pid process target process PID 1532 wrote to memory of 1744 1532 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe PID 1532 wrote to memory of 1744 1532 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe PID 1532 wrote to memory of 1744 1532 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe PID 1532 wrote to memory of 1744 1532 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe PID 1532 wrote to memory of 1744 1532 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe PID 1532 wrote to memory of 1744 1532 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe PID 1532 wrote to memory of 1744 1532 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe PID 1532 wrote to memory of 1528 1532 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe PID 1532 wrote to memory of 1528 1532 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe PID 1532 wrote to memory of 1528 1532 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe PID 1532 wrote to memory of 1528 1532 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe PID 1532 wrote to memory of 1528 1532 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe PID 1532 wrote to memory of 1528 1532 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe PID 1532 wrote to memory of 1528 1532 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe 5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe"C:\Users\Admin\AppData\Local\Temp\5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exestart2⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\5b438fa7dfe5bc36d92407235250f708b5f697b72d9b3b52bb074e9c725188f7.exewatch2⤵PID:1528