Analysis
-
max time kernel
47s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:56
Static task
static1
Behavioral task
behavioral1
Sample
77db040e06faf11d0306351188fa0093c37670a4d03f3cc2f189bb8a6deaf8cf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
77db040e06faf11d0306351188fa0093c37670a4d03f3cc2f189bb8a6deaf8cf.exe
Resource
win10v2004-20220812-en
General
-
Target
77db040e06faf11d0306351188fa0093c37670a4d03f3cc2f189bb8a6deaf8cf.exe
-
Size
524KB
-
MD5
99c1dc8abed52a340d729477f1329966
-
SHA1
dd8ab299db817d6edcd22989ad779d7c476bf25a
-
SHA256
77db040e06faf11d0306351188fa0093c37670a4d03f3cc2f189bb8a6deaf8cf
-
SHA512
aca6726905bd5bc3d6a87fb75288cb13b4c010f6fb60d64042160d77dc5fc715a7ac410e2e54b239820f41de903b8b8f37e1ae55fcbdca3c11d222621430e843
-
SSDEEP
12288:AZqUXI+mdt50FQxbGoh8VzvBVKXCuapzDBG:cqGIlLquIY8VzvSXCXD
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
77db040e06faf11d0306351188fa0093c37670a4d03f3cc2f189bb8a6deaf8cf.exedescription pid process target process PID 772 wrote to memory of 1636 772 77db040e06faf11d0306351188fa0093c37670a4d03f3cc2f189bb8a6deaf8cf.exe 77db040e06faf11d0306351188fa0093c37670a4d03f3cc2f189bb8a6deaf8cf.exe PID 772 wrote to memory of 1636 772 77db040e06faf11d0306351188fa0093c37670a4d03f3cc2f189bb8a6deaf8cf.exe 77db040e06faf11d0306351188fa0093c37670a4d03f3cc2f189bb8a6deaf8cf.exe PID 772 wrote to memory of 1636 772 77db040e06faf11d0306351188fa0093c37670a4d03f3cc2f189bb8a6deaf8cf.exe 77db040e06faf11d0306351188fa0093c37670a4d03f3cc2f189bb8a6deaf8cf.exe PID 772 wrote to memory of 1636 772 77db040e06faf11d0306351188fa0093c37670a4d03f3cc2f189bb8a6deaf8cf.exe 77db040e06faf11d0306351188fa0093c37670a4d03f3cc2f189bb8a6deaf8cf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77db040e06faf11d0306351188fa0093c37670a4d03f3cc2f189bb8a6deaf8cf.exe"C:\Users\Admin\AppData\Local\Temp\77db040e06faf11d0306351188fa0093c37670a4d03f3cc2f189bb8a6deaf8cf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\77db040e06faf11d0306351188fa0093c37670a4d03f3cc2f189bb8a6deaf8cf.exetear2⤵PID:1636
-