Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:34
Static task
static1
Behavioral task
behavioral1
Sample
9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exe
Resource
win10v2004-20220812-en
General
-
Target
9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exe
-
Size
524KB
-
MD5
1ca4117bcc79b5c20ac044465833654b
-
SHA1
691c65019fd105c6a5c8ebb7ebf2e1df3c2cc1df
-
SHA256
9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea
-
SHA512
3703943b1c04e036188ebf2c85efb953cb5f921f1fd123fb85470fcc0f911d1e83904574bf8162c7cbb1f44d9a7b33f862df959f7524f6852fa47663ec3a1c64
-
SSDEEP
12288:gs0vsZdbMqkMLhX0JcufzCSVzvBVKXCuapzDBG:K2hB0vfznVzvSXCXD
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exedescription pid process target process PID 2012 wrote to memory of 1964 2012 9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exe 9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exe PID 2012 wrote to memory of 1964 2012 9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exe 9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exe PID 2012 wrote to memory of 1964 2012 9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exe 9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exe PID 2012 wrote to memory of 1964 2012 9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exe 9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exe"C:\Users\Admin\AppData\Local\Temp\9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exetear2⤵PID:1964