Analysis
-
max time kernel
21s -
max time network
61s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:35
Static task
static1
Behavioral task
behavioral1
Sample
fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe
Resource
win10v2004-20221111-en
General
-
Target
fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe
-
Size
521KB
-
MD5
46a95f4bd27cb64467e0de50841cb4d3
-
SHA1
17c87449bc164886c294005865069623f8a98965
-
SHA256
fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c
-
SHA512
13074e39a7d7c58465e858ece9c392026b04b1337384cc2215fdfe3f96332c26ada1e1596a789ceccf78a8cc5560bcec1ff0d90b11958ab8b22e00c655f02df5
-
SSDEEP
12288:Al3H6daX4lV2rlxyQlZs/wxgtPb91xv8azrRMe7Rm3Hcq:wEO4Yx49RNb7kh
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exedescription pid process target process PID 1536 wrote to memory of 1364 1536 fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe PID 1536 wrote to memory of 1364 1536 fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe PID 1536 wrote to memory of 1364 1536 fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe PID 1536 wrote to memory of 1364 1536 fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe PID 1536 wrote to memory of 1364 1536 fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe PID 1536 wrote to memory of 1364 1536 fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe PID 1536 wrote to memory of 1364 1536 fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe PID 1536 wrote to memory of 1340 1536 fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe PID 1536 wrote to memory of 1340 1536 fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe PID 1536 wrote to memory of 1340 1536 fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe PID 1536 wrote to memory of 1340 1536 fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe PID 1536 wrote to memory of 1340 1536 fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe PID 1536 wrote to memory of 1340 1536 fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe PID 1536 wrote to memory of 1340 1536 fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe"C:\Users\Admin\AppData\Local\Temp\fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exestart2⤵PID:1364
-
-
C:\Users\Admin\AppData\Local\Temp\fecefb42f46140d10cb0e15b9f027db1c77bcd2e437fe2b73640ce13418a3d4c.exewatch2⤵PID:1340
-