Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:23
Static task
static1
Behavioral task
behavioral1
Sample
4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe
Resource
win10v2004-20220901-en
General
-
Target
4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe
-
Size
518KB
-
MD5
453cf118d840781da252a3050d8aa83c
-
SHA1
f782d653866da85b5ae681f00bd8789e777a56e9
-
SHA256
4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967
-
SHA512
1ab351e850c95ee12f7a0fe8f64b1ba3d126221b0e2c2d400af30f950364dbd55bb08bc8c507dd8a0dcf90c8c2b0b86ba78269e5070d0794a6e7f278dab44a89
-
SSDEEP
12288:LSUcZLmvGzwPUjASES/ya+WJPwTOE0/M:LZcZLWPuAsz+OPwTv0/
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exedescription pid process target process PID 1632 wrote to memory of 1552 1632 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe PID 1632 wrote to memory of 1552 1632 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe PID 1632 wrote to memory of 1552 1632 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe PID 1632 wrote to memory of 1552 1632 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe PID 1632 wrote to memory of 1552 1632 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe PID 1632 wrote to memory of 1552 1632 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe PID 1632 wrote to memory of 1552 1632 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe PID 1632 wrote to memory of 1512 1632 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe PID 1632 wrote to memory of 1512 1632 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe PID 1632 wrote to memory of 1512 1632 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe PID 1632 wrote to memory of 1512 1632 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe PID 1632 wrote to memory of 1512 1632 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe PID 1632 wrote to memory of 1512 1632 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe PID 1632 wrote to memory of 1512 1632 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe 4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe"C:\Users\Admin\AppData\Local\Temp\4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exestart2⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\4b342dfa59647aed2c77521b46e55f7ac4a8d7321a1292ebb875709e215f1967.exewatch2⤵PID:1512