Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:35
Static task
static1
Behavioral task
behavioral1
Sample
fed837f2b2d02c0710f4bb04695d44bc764e14a16c948feeeece255b81b2aebb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fed837f2b2d02c0710f4bb04695d44bc764e14a16c948feeeece255b81b2aebb.exe
Resource
win10v2004-20220812-en
General
-
Target
fed837f2b2d02c0710f4bb04695d44bc764e14a16c948feeeece255b81b2aebb.exe
-
Size
524KB
-
MD5
8b44f0208d3745ecfc3f5d00b7ee1d0c
-
SHA1
c81d56354e55fe92194927765b1011bd323b8e73
-
SHA256
fed837f2b2d02c0710f4bb04695d44bc764e14a16c948feeeece255b81b2aebb
-
SHA512
969501d55fc891828ef413d51c5e232ab007d0686beac9c5526753ba9c201dc5981cbaf0f1a6d135b9d937646084eaf47546950fb02da113929ba891ceed7db2
-
SSDEEP
12288:r6dArhIjHneqrhEcweZJ/KCJnVzvBVKXCuapzDBG:rpAHeqrhHrfnVzvSXCXD
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
fed837f2b2d02c0710f4bb04695d44bc764e14a16c948feeeece255b81b2aebb.exedescription pid process target process PID 884 wrote to memory of 1724 884 fed837f2b2d02c0710f4bb04695d44bc764e14a16c948feeeece255b81b2aebb.exe fed837f2b2d02c0710f4bb04695d44bc764e14a16c948feeeece255b81b2aebb.exe PID 884 wrote to memory of 1724 884 fed837f2b2d02c0710f4bb04695d44bc764e14a16c948feeeece255b81b2aebb.exe fed837f2b2d02c0710f4bb04695d44bc764e14a16c948feeeece255b81b2aebb.exe PID 884 wrote to memory of 1724 884 fed837f2b2d02c0710f4bb04695d44bc764e14a16c948feeeece255b81b2aebb.exe fed837f2b2d02c0710f4bb04695d44bc764e14a16c948feeeece255b81b2aebb.exe PID 884 wrote to memory of 1724 884 fed837f2b2d02c0710f4bb04695d44bc764e14a16c948feeeece255b81b2aebb.exe fed837f2b2d02c0710f4bb04695d44bc764e14a16c948feeeece255b81b2aebb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fed837f2b2d02c0710f4bb04695d44bc764e14a16c948feeeece255b81b2aebb.exe"C:\Users\Admin\AppData\Local\Temp\fed837f2b2d02c0710f4bb04695d44bc764e14a16c948feeeece255b81b2aebb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\fed837f2b2d02c0710f4bb04695d44bc764e14a16c948feeeece255b81b2aebb.exetear2⤵PID:1724
-