Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:14
Static task
static1
Behavioral task
behavioral1
Sample
4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe
Resource
win10v2004-20221111-en
General
-
Target
4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe
-
Size
522KB
-
MD5
55344f8e906bcc3d08e15083d6ce9a8a
-
SHA1
cfa805747b49e61d127f1b2bbb2e64dc04b57a26
-
SHA256
4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812
-
SHA512
395974d637a0560b9ce17793a65f1c9a9ad31d2d6825e44e2a3cffbc33e2b2f50293a8bdadc6a947025f5e95027bda05bb321b78de52bfbdab771fb6b0181c20
-
SSDEEP
12288:CCRTMnHaHm1+mHc1mUVVJ2zZy18xQqpx8O5Dn:xqnlAmHSVn2latqpx8k
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exedescription pid process target process PID 2004 wrote to memory of 880 2004 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe PID 2004 wrote to memory of 880 2004 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe PID 2004 wrote to memory of 880 2004 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe PID 2004 wrote to memory of 880 2004 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe PID 2004 wrote to memory of 880 2004 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe PID 2004 wrote to memory of 880 2004 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe PID 2004 wrote to memory of 880 2004 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe PID 2004 wrote to memory of 1988 2004 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe PID 2004 wrote to memory of 1988 2004 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe PID 2004 wrote to memory of 1988 2004 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe PID 2004 wrote to memory of 1988 2004 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe PID 2004 wrote to memory of 1988 2004 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe PID 2004 wrote to memory of 1988 2004 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe PID 2004 wrote to memory of 1988 2004 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe 4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe"C:\Users\Admin\AppData\Local\Temp\4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exestart2⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\4d3bf6606aecac7bebeecd34d35e627b8e50a3982e1937dd5cfbcd6ea0f5c812.exewatch2⤵PID:1988