Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:16
Static task
static1
Behavioral task
behavioral1
Sample
56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe
Resource
win10v2004-20221111-en
General
-
Target
56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe
-
Size
522KB
-
MD5
45fb732fdf80a70212d2922614eb0d9c
-
SHA1
13d2c7c913c1e282857fe804f2872f9593d49598
-
SHA256
56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c
-
SHA512
224c9ee1e6ba93afbc565c196592cca0a77de2ef45b14438d4fe1ad7735a8320d45f3144550b618882a5b5c2002ca58d0ab0f61b757257463ddce30179393567
-
SSDEEP
6144:uk/Ak+GUKZhKZheLRyKoui0l4rX2p0xuATStmQy1CrxQqD9RSaSz+8O5NA:DlfhGqR8uXEedy18xQqpx8O5N
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exedescription pid process target process PID 1372 wrote to memory of 2044 1372 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe PID 1372 wrote to memory of 2044 1372 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe PID 1372 wrote to memory of 2044 1372 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe PID 1372 wrote to memory of 2044 1372 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe PID 1372 wrote to memory of 2044 1372 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe PID 1372 wrote to memory of 2044 1372 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe PID 1372 wrote to memory of 2044 1372 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe PID 1372 wrote to memory of 1600 1372 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe PID 1372 wrote to memory of 1600 1372 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe PID 1372 wrote to memory of 1600 1372 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe PID 1372 wrote to memory of 1600 1372 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe PID 1372 wrote to memory of 1600 1372 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe PID 1372 wrote to memory of 1600 1372 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe PID 1372 wrote to memory of 1600 1372 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe 56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe"C:\Users\Admin\AppData\Local\Temp\56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exestart2⤵PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\56f9c5e3ffa447d397739ae3b98b96a67f159fee950bef7445eba783dbfc251c.exewatch2⤵PID:1600
-