Analysis
-
max time kernel
41s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:10
Static task
static1
Behavioral task
behavioral1
Sample
610b19641454e18070879c5cc243fe24387256778145ce9f9133049bad083b05.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
610b19641454e18070879c5cc243fe24387256778145ce9f9133049bad083b05.exe
Resource
win10v2004-20221111-en
General
-
Target
610b19641454e18070879c5cc243fe24387256778145ce9f9133049bad083b05.exe
-
Size
530KB
-
MD5
4fc8d9c7c7b9d04868e237aa6de0d9d0
-
SHA1
b454e958b0ab3184986560ce557eb95b1c7f85ee
-
SHA256
610b19641454e18070879c5cc243fe24387256778145ce9f9133049bad083b05
-
SHA512
20086c21cf5207a6f090becf5634f73ec0f4a48a42748f8ece879c548982621c337d337608bcb8f95b81959a8cc08b9798ea94e5f6ec63999e07210d2cef5d72
-
SSDEEP
12288:esx81i0HJ7SLx7+jutSzNGZspc1mmIFGtJaY1bvt:e5177S7+jPzsZspc1mmDtJNr
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
610b19641454e18070879c5cc243fe24387256778145ce9f9133049bad083b05.exedescription pid process target process PID 2016 wrote to memory of 316 2016 610b19641454e18070879c5cc243fe24387256778145ce9f9133049bad083b05.exe 610b19641454e18070879c5cc243fe24387256778145ce9f9133049bad083b05.exe PID 2016 wrote to memory of 316 2016 610b19641454e18070879c5cc243fe24387256778145ce9f9133049bad083b05.exe 610b19641454e18070879c5cc243fe24387256778145ce9f9133049bad083b05.exe PID 2016 wrote to memory of 316 2016 610b19641454e18070879c5cc243fe24387256778145ce9f9133049bad083b05.exe 610b19641454e18070879c5cc243fe24387256778145ce9f9133049bad083b05.exe PID 2016 wrote to memory of 316 2016 610b19641454e18070879c5cc243fe24387256778145ce9f9133049bad083b05.exe 610b19641454e18070879c5cc243fe24387256778145ce9f9133049bad083b05.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\610b19641454e18070879c5cc243fe24387256778145ce9f9133049bad083b05.exe"C:\Users\Admin\AppData\Local\Temp\610b19641454e18070879c5cc243fe24387256778145ce9f9133049bad083b05.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\610b19641454e18070879c5cc243fe24387256778145ce9f9133049bad083b05.exetear2⤵PID:316
-