Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:22
Static task
static1
Behavioral task
behavioral1
Sample
afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe
Resource
win10v2004-20220812-en
General
-
Target
afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe
-
Size
522KB
-
MD5
685fb90f3790ecaa038c30a54f5e3e5a
-
SHA1
6adba5b60708dbfe906a17caeedd690af3c8048c
-
SHA256
afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c
-
SHA512
ad5ecdca005dbf92699576f0d3a2b51e24afd8109212eadf58e902c4ad8bb7be507c39cc7aaff86c1d762efda4071cca51751dcbb4badda078b6d5d446c52235
-
SSDEEP
6144:1KUupp0dAyjohlTlwwFk9p7NkMrVfn2Yh+uNRicUPf1ECaqpUxdrZPkTY/210YOy:wpLyjcwPzXZNGcDCDpwtWsjYO9AtwXx
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exedescription pid process target process PID 1848 wrote to memory of 1728 1848 afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe PID 1848 wrote to memory of 1728 1848 afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe PID 1848 wrote to memory of 1728 1848 afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe PID 1848 wrote to memory of 1728 1848 afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe PID 1848 wrote to memory of 1728 1848 afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe PID 1848 wrote to memory of 1728 1848 afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe PID 1848 wrote to memory of 1728 1848 afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe PID 1848 wrote to memory of 1752 1848 afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe PID 1848 wrote to memory of 1752 1848 afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe PID 1848 wrote to memory of 1752 1848 afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe PID 1848 wrote to memory of 1752 1848 afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe PID 1848 wrote to memory of 1752 1848 afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe PID 1848 wrote to memory of 1752 1848 afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe PID 1848 wrote to memory of 1752 1848 afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe"C:\Users\Admin\AppData\Local\Temp\afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exestart2⤵PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\afe581308095269e9df29179ef572e47eb19f285a6f234668680b62e85d1445c.exewatch2⤵PID:1752
-