Analysis
-
max time kernel
64s -
max time network
104s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:42
Static task
static1
Behavioral task
behavioral1
Sample
2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe
Resource
win10v2004-20221111-en
General
-
Target
2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe
-
Size
518KB
-
MD5
04eb679857a5a79801026c1001ca31c7
-
SHA1
bd98821f1d52b77c4c2cc37ed10a52ca52681c8e
-
SHA256
2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb
-
SHA512
1cc7ff2f4195ef8671a536939fb7bc7f1309646bed5376644500c83f03b03216ab1f411cd7c05f633c1848b62300c36ea3579d95dc3317845a413b2548d0efb7
-
SSDEEP
12288:kV6tyts64C6ZAWPDfwPUjASES/ya+WJPwTOE0/+VZ:kcemhZALPuAsz+OPwTv0/E
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exedescription pid process target process PID 564 wrote to memory of 1844 564 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe PID 564 wrote to memory of 1844 564 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe PID 564 wrote to memory of 1844 564 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe PID 564 wrote to memory of 1844 564 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe PID 564 wrote to memory of 1844 564 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe PID 564 wrote to memory of 1844 564 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe PID 564 wrote to memory of 1844 564 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe PID 564 wrote to memory of 280 564 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe PID 564 wrote to memory of 280 564 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe PID 564 wrote to memory of 280 564 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe PID 564 wrote to memory of 280 564 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe PID 564 wrote to memory of 280 564 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe PID 564 wrote to memory of 280 564 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe PID 564 wrote to memory of 280 564 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe 2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe"C:\Users\Admin\AppData\Local\Temp\2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exestart2⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\2a8bf2baf2e758e53c86da0ccba203ca1e941e3568c4e99262f2bb0b3c9485eb.exewatch2⤵PID:280