Analysis
-
max time kernel
25s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:25
Static task
static1
Behavioral task
behavioral1
Sample
046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe
Resource
win10v2004-20221111-en
General
-
Target
046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe
-
Size
518KB
-
MD5
4c173b65ef33fb4c44e40a5733a593b7
-
SHA1
30877b61828121edd640b8e6dfe94dd9dff0de85
-
SHA256
046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397
-
SHA512
bdf8879ccbdb949b0ca8a31f62c3c33b450a6c9a1d82eee4fc6fc46a1afa2e2c92689a92164ff1b1cf78f8029ea6b278954c70bdb753a1a8ee53b6fd5e1ffa4b
-
SSDEEP
12288:D9qCbbE1H3xcd8n7kH3NiJwYYlLPt5oKnWq3hb:DxbbY3xA0I9JlLPt5/W0
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exedescription pid process target process PID 2040 wrote to memory of 840 2040 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe PID 2040 wrote to memory of 840 2040 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe PID 2040 wrote to memory of 840 2040 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe PID 2040 wrote to memory of 840 2040 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe PID 2040 wrote to memory of 840 2040 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe PID 2040 wrote to memory of 840 2040 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe PID 2040 wrote to memory of 840 2040 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe PID 2040 wrote to memory of 1360 2040 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe PID 2040 wrote to memory of 1360 2040 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe PID 2040 wrote to memory of 1360 2040 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe PID 2040 wrote to memory of 1360 2040 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe PID 2040 wrote to memory of 1360 2040 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe PID 2040 wrote to memory of 1360 2040 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe PID 2040 wrote to memory of 1360 2040 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe 046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe"C:\Users\Admin\AppData\Local\Temp\046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exestart2⤵PID:840
-
-
C:\Users\Admin\AppData\Local\Temp\046d9ff09830fbe06723da65fc9bdc5d57bd5a26ab8e9f0eb3b2ca1e59f3e397.exewatch2⤵PID:1360
-