Analysis
-
max time kernel
147s -
max time network
232s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:34
Static task
static1
Behavioral task
behavioral1
Sample
9b9d77b64aa5b38bd6038c189f77a36361f0b24bfa3bb7a79b66541b076a11d0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9b9d77b64aa5b38bd6038c189f77a36361f0b24bfa3bb7a79b66541b076a11d0.exe
Resource
win10v2004-20221111-en
General
-
Target
9b9d77b64aa5b38bd6038c189f77a36361f0b24bfa3bb7a79b66541b076a11d0.exe
-
Size
524KB
-
MD5
4661d79ddeb6f382712c9b1ea905cb60
-
SHA1
3062fc4f03af523519ef584201e6a26cd8647198
-
SHA256
9b9d77b64aa5b38bd6038c189f77a36361f0b24bfa3bb7a79b66541b076a11d0
-
SHA512
21e7bc8fc75d995a16f82610f3236475c06921a6580360a422022cc6037b4f53b6b0572bc229e5aa6865a1f075f80e1260eb25700c7e14a8394dcdb425a10013
-
SSDEEP
12288:rPwvhkzPpYJ6q9Xf6e3K7oc5M1lagjnRyPSAMuP:rPwvhqpYJ6q9iUK0FagjRyPSAMk
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
9b9d77b64aa5b38bd6038c189f77a36361f0b24bfa3bb7a79b66541b076a11d0.exedescription pid process target process PID 560 wrote to memory of 1344 560 9b9d77b64aa5b38bd6038c189f77a36361f0b24bfa3bb7a79b66541b076a11d0.exe 9b9d77b64aa5b38bd6038c189f77a36361f0b24bfa3bb7a79b66541b076a11d0.exe PID 560 wrote to memory of 1344 560 9b9d77b64aa5b38bd6038c189f77a36361f0b24bfa3bb7a79b66541b076a11d0.exe 9b9d77b64aa5b38bd6038c189f77a36361f0b24bfa3bb7a79b66541b076a11d0.exe PID 560 wrote to memory of 1344 560 9b9d77b64aa5b38bd6038c189f77a36361f0b24bfa3bb7a79b66541b076a11d0.exe 9b9d77b64aa5b38bd6038c189f77a36361f0b24bfa3bb7a79b66541b076a11d0.exe PID 560 wrote to memory of 1344 560 9b9d77b64aa5b38bd6038c189f77a36361f0b24bfa3bb7a79b66541b076a11d0.exe 9b9d77b64aa5b38bd6038c189f77a36361f0b24bfa3bb7a79b66541b076a11d0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b9d77b64aa5b38bd6038c189f77a36361f0b24bfa3bb7a79b66541b076a11d0.exe"C:\Users\Admin\AppData\Local\Temp\9b9d77b64aa5b38bd6038c189f77a36361f0b24bfa3bb7a79b66541b076a11d0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\9b9d77b64aa5b38bd6038c189f77a36361f0b24bfa3bb7a79b66541b076a11d0.exetear2⤵PID:1344