Analysis
-
max time kernel
17s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:22
Static task
static1
Behavioral task
behavioral1
Sample
4db6adb6f68ffdf9b8bd6d2648567778b7fa236374888625f616071119afce9b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4db6adb6f68ffdf9b8bd6d2648567778b7fa236374888625f616071119afce9b.exe
Resource
win10v2004-20221111-en
General
-
Target
4db6adb6f68ffdf9b8bd6d2648567778b7fa236374888625f616071119afce9b.exe
-
Size
533KB
-
MD5
ab4eb3bc86caf2f632fdd168c6b50dcc
-
SHA1
6e117fc41d0ee3f763072eece6341b7769d30b3a
-
SHA256
4db6adb6f68ffdf9b8bd6d2648567778b7fa236374888625f616071119afce9b
-
SHA512
ed979a3198f4ff3b4c9004a9e069a3bfcd0627a0b1c192f5912aabc98cb148d40ea3fc5f0fc24a7e2f1619eb347cf0bf496c819b82540a21d410693eac03f2b4
-
SSDEEP
12288:yK+b0yMQTk6rOFKNx0GLM5ChzQ1RVykhjY:YbrMYrOsNx0GLrh01jy+0
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
4db6adb6f68ffdf9b8bd6d2648567778b7fa236374888625f616071119afce9b.exedescription pid process target process PID 1932 wrote to memory of 1920 1932 4db6adb6f68ffdf9b8bd6d2648567778b7fa236374888625f616071119afce9b.exe 4db6adb6f68ffdf9b8bd6d2648567778b7fa236374888625f616071119afce9b.exe PID 1932 wrote to memory of 1920 1932 4db6adb6f68ffdf9b8bd6d2648567778b7fa236374888625f616071119afce9b.exe 4db6adb6f68ffdf9b8bd6d2648567778b7fa236374888625f616071119afce9b.exe PID 1932 wrote to memory of 1920 1932 4db6adb6f68ffdf9b8bd6d2648567778b7fa236374888625f616071119afce9b.exe 4db6adb6f68ffdf9b8bd6d2648567778b7fa236374888625f616071119afce9b.exe PID 1932 wrote to memory of 1920 1932 4db6adb6f68ffdf9b8bd6d2648567778b7fa236374888625f616071119afce9b.exe 4db6adb6f68ffdf9b8bd6d2648567778b7fa236374888625f616071119afce9b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4db6adb6f68ffdf9b8bd6d2648567778b7fa236374888625f616071119afce9b.exe"C:\Users\Admin\AppData\Local\Temp\4db6adb6f68ffdf9b8bd6d2648567778b7fa236374888625f616071119afce9b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\4db6adb6f68ffdf9b8bd6d2648567778b7fa236374888625f616071119afce9b.exetear2⤵PID:1920