Analysis
-
max time kernel
36s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:16
Static task
static1
Behavioral task
behavioral1
Sample
44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe
Resource
win10v2004-20221111-en
General
-
Target
44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe
-
Size
518KB
-
MD5
ca4d0d93c7ff19959c8017652d492d3f
-
SHA1
b9750a69a0401c01b3b127bf092c334d2c95bfd8
-
SHA256
44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889
-
SHA512
26a7342496aef86ccf5d1987a7912f4338531d2d1184bb58cfb787a7e9ea73bde8e8d165250638474f7990948f5e941b1993a322ea69248d295f6285225ead30
-
SSDEEP
12288:6mbmEi39njUJXhJWBFwYYlLPt5oKnWq39bP:zKE6nsXh0BClLPt5/WgP
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exedescription pid process target process PID 944 wrote to memory of 868 944 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe PID 944 wrote to memory of 868 944 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe PID 944 wrote to memory of 868 944 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe PID 944 wrote to memory of 868 944 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe PID 944 wrote to memory of 868 944 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe PID 944 wrote to memory of 868 944 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe PID 944 wrote to memory of 868 944 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe PID 944 wrote to memory of 1108 944 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe PID 944 wrote to memory of 1108 944 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe PID 944 wrote to memory of 1108 944 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe PID 944 wrote to memory of 1108 944 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe PID 944 wrote to memory of 1108 944 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe PID 944 wrote to memory of 1108 944 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe PID 944 wrote to memory of 1108 944 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe 44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe"C:\Users\Admin\AppData\Local\Temp\44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exestart2⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\44ebc6b8aaab1ddc1d9363a49a24ded3e3d678ce5ea97742eac61448b1998889.exewatch2⤵PID:1108