Analysis
-
max time kernel
129s -
max time network
207s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:27
Static task
static1
Behavioral task
behavioral1
Sample
45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe
Resource
win10v2004-20221111-en
General
-
Target
45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe
-
Size
522KB
-
MD5
5292eca1fbdc8f81a3be0d3534f81d9b
-
SHA1
46a7145cba9fd96cedaf8045516f102efa2fc1b4
-
SHA256
45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2
-
SHA512
6cf89e4d4c394681dab02f807d9d277b883a3ae1a13ad619269dbaa7d97c6cfdac645e3f3c8f2b61a49f10c0f9266088d54a3466acac09ce64b97dc12609e3db
-
SSDEEP
6144:6oX2PEVvmPy2Wz5qFSoulcGpphtjKTQiPdDN0Qn49aYoCmQy1CrxQqD9RSaSz+8d:WNP5SorGvhjydh0iHLqy18xQqpx8O5v
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exedescription pid process target process PID 1516 wrote to memory of 1116 1516 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 1516 wrote to memory of 1116 1516 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 1516 wrote to memory of 1116 1516 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 1516 wrote to memory of 1116 1516 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 1516 wrote to memory of 1116 1516 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 1516 wrote to memory of 1116 1516 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 1516 wrote to memory of 1116 1516 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 1516 wrote to memory of 520 1516 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 1516 wrote to memory of 520 1516 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 1516 wrote to memory of 520 1516 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 1516 wrote to memory of 520 1516 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 1516 wrote to memory of 520 1516 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 1516 wrote to memory of 520 1516 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 1516 wrote to memory of 520 1516 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe"C:\Users\Admin\AppData\Local\Temp\45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exestart2⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exewatch2⤵PID:520