Analysis
-
max time kernel
113s -
max time network
202s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:18
Static task
static1
Behavioral task
behavioral1
Sample
b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe
Resource
win10v2004-20221111-en
General
-
Target
b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe
-
Size
522KB
-
MD5
14319d0297f46ef295581887d27844f0
-
SHA1
7c018de5de4a41dae077cac3d6cbe1d5222f5b1c
-
SHA256
b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c
-
SHA512
3caf896dbbf00a681419a949e92d3189c95042acf38ba2ec3556040f63f7c72c019a6f130876b42efc212054b4f977d3924b7fdd242b3292301b15e7fc26730e
-
SSDEEP
12288:aYDh/6MGnh+v+7Y51ni+y18xQqpx8O5g:aYDh/YnAEa1Natqpx8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exedescription pid process target process PID 964 wrote to memory of 468 964 b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe PID 964 wrote to memory of 468 964 b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe PID 964 wrote to memory of 468 964 b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe PID 964 wrote to memory of 468 964 b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe PID 964 wrote to memory of 468 964 b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe PID 964 wrote to memory of 468 964 b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe PID 964 wrote to memory of 468 964 b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe PID 964 wrote to memory of 748 964 b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe PID 964 wrote to memory of 748 964 b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe PID 964 wrote to memory of 748 964 b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe PID 964 wrote to memory of 748 964 b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe PID 964 wrote to memory of 748 964 b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe PID 964 wrote to memory of 748 964 b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe PID 964 wrote to memory of 748 964 b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe"C:\Users\Admin\AppData\Local\Temp\b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exestart2⤵PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\b56ec08cad2654ee8af2bfb215414ae79f135402bc9825747cb90c69cc53448c.exewatch2⤵PID:748
-