Analysis
-
max time kernel
53s -
max time network
105s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:14
Static task
static1
Behavioral task
behavioral1
Sample
4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe
Resource
win10v2004-20221111-en
General
-
Target
4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe
-
Size
518KB
-
MD5
0c3bd55f130b7e47fc506f1bea231011
-
SHA1
3905608ce4e5a6f52c2c10017d35f9ac67073be6
-
SHA256
4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241
-
SHA512
88cd1a0ff7e7a8b5721509063d6dcc19e06120eb3b3e2b94909eb27a7af9a916b902e6b42504537e81b70a108e626b7aab3610c3559b84998a28e1a699735bb6
-
SSDEEP
12288:CeO2dPBwJeQBVVTJvuwYYlLPt5oKnWq3Cb:CeO2dpw/TVTJ3lLPt5/Wr
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exedescription pid process target process PID 884 wrote to memory of 1120 884 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe PID 884 wrote to memory of 1120 884 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe PID 884 wrote to memory of 1120 884 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe PID 884 wrote to memory of 1120 884 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe PID 884 wrote to memory of 1120 884 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe PID 884 wrote to memory of 1120 884 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe PID 884 wrote to memory of 1120 884 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe PID 884 wrote to memory of 1476 884 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe PID 884 wrote to memory of 1476 884 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe PID 884 wrote to memory of 1476 884 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe PID 884 wrote to memory of 1476 884 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe PID 884 wrote to memory of 1476 884 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe PID 884 wrote to memory of 1476 884 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe PID 884 wrote to memory of 1476 884 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe 4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe"C:\Users\Admin\AppData\Local\Temp\4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exewatch2⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\4b508b5b29521591c1f75739136f40d06cd0b5aa8f32f56f84b6555a1dafc241.exestart2⤵PID:1120