Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:33
Static task
static1
Behavioral task
behavioral1
Sample
9d066dbcc7f733c733fa52fe24fc146a0f0595962068fe215bf706a4d49d87f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9d066dbcc7f733c733fa52fe24fc146a0f0595962068fe215bf706a4d49d87f5.exe
Resource
win10v2004-20221111-en
General
-
Target
9d066dbcc7f733c733fa52fe24fc146a0f0595962068fe215bf706a4d49d87f5.exe
-
Size
524KB
-
MD5
c58d3c250e80947af0edae2600cfb203
-
SHA1
0ed3f5203852ee7c10c4affd2a85f12e7f2b3035
-
SHA256
9d066dbcc7f733c733fa52fe24fc146a0f0595962068fe215bf706a4d49d87f5
-
SHA512
95fe872728e156f68a1127c93a65426dd05da6a66dcce69cd9cd9eafe380da7a53066add1f6b3228b85635e4b061279ca69d5da6efe091dd59a7f8f0e34c9c51
-
SSDEEP
6144:N0n+XsB8O2Wjg9f9gO/AxhTc+Vw1F0XJe8CECBZvBVF8X2Vx2FBa3Lm+dpHB3SMD:N09I9frwdHy0XKVzvBVKXCuapzDBGR
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
9d066dbcc7f733c733fa52fe24fc146a0f0595962068fe215bf706a4d49d87f5.exedescription pid process target process PID 240 wrote to memory of 1672 240 9d066dbcc7f733c733fa52fe24fc146a0f0595962068fe215bf706a4d49d87f5.exe 9d066dbcc7f733c733fa52fe24fc146a0f0595962068fe215bf706a4d49d87f5.exe PID 240 wrote to memory of 1672 240 9d066dbcc7f733c733fa52fe24fc146a0f0595962068fe215bf706a4d49d87f5.exe 9d066dbcc7f733c733fa52fe24fc146a0f0595962068fe215bf706a4d49d87f5.exe PID 240 wrote to memory of 1672 240 9d066dbcc7f733c733fa52fe24fc146a0f0595962068fe215bf706a4d49d87f5.exe 9d066dbcc7f733c733fa52fe24fc146a0f0595962068fe215bf706a4d49d87f5.exe PID 240 wrote to memory of 1672 240 9d066dbcc7f733c733fa52fe24fc146a0f0595962068fe215bf706a4d49d87f5.exe 9d066dbcc7f733c733fa52fe24fc146a0f0595962068fe215bf706a4d49d87f5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d066dbcc7f733c733fa52fe24fc146a0f0595962068fe215bf706a4d49d87f5.exe"C:\Users\Admin\AppData\Local\Temp\9d066dbcc7f733c733fa52fe24fc146a0f0595962068fe215bf706a4d49d87f5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Users\Admin\AppData\Local\Temp\9d066dbcc7f733c733fa52fe24fc146a0f0595962068fe215bf706a4d49d87f5.exetear2⤵PID:1672