Analysis
-
max time kernel
23s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:29
Static task
static1
Behavioral task
behavioral1
Sample
41dbbd3bf5a5f6146d7fee0dfa0430dd11cbf0ea68718e4c9af0a58db65748bf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
41dbbd3bf5a5f6146d7fee0dfa0430dd11cbf0ea68718e4c9af0a58db65748bf.exe
Resource
win10v2004-20220812-en
General
-
Target
41dbbd3bf5a5f6146d7fee0dfa0430dd11cbf0ea68718e4c9af0a58db65748bf.exe
-
Size
524KB
-
MD5
aa9798ff8e41e57adbab04998a7ff0e8
-
SHA1
b2ae1eb4769dde64b754527283c667f92830d0ac
-
SHA256
41dbbd3bf5a5f6146d7fee0dfa0430dd11cbf0ea68718e4c9af0a58db65748bf
-
SHA512
f5b8df49bfbdb0cfa03a874b62feacb5dbba946aa22d35fcdef3da9a9ad4fbeeba7c631cb93efc9b76f805aa7df7d9eb71b80bc3f29fc05adb13c573c49e8145
-
SSDEEP
12288:OybbAoQ2+7+wCeGHrLVzvBVKXCuapzDBG:4oO+w8nVzvSXCXD
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
41dbbd3bf5a5f6146d7fee0dfa0430dd11cbf0ea68718e4c9af0a58db65748bf.exedescription pid process target process PID 1948 wrote to memory of 2036 1948 41dbbd3bf5a5f6146d7fee0dfa0430dd11cbf0ea68718e4c9af0a58db65748bf.exe 41dbbd3bf5a5f6146d7fee0dfa0430dd11cbf0ea68718e4c9af0a58db65748bf.exe PID 1948 wrote to memory of 2036 1948 41dbbd3bf5a5f6146d7fee0dfa0430dd11cbf0ea68718e4c9af0a58db65748bf.exe 41dbbd3bf5a5f6146d7fee0dfa0430dd11cbf0ea68718e4c9af0a58db65748bf.exe PID 1948 wrote to memory of 2036 1948 41dbbd3bf5a5f6146d7fee0dfa0430dd11cbf0ea68718e4c9af0a58db65748bf.exe 41dbbd3bf5a5f6146d7fee0dfa0430dd11cbf0ea68718e4c9af0a58db65748bf.exe PID 1948 wrote to memory of 2036 1948 41dbbd3bf5a5f6146d7fee0dfa0430dd11cbf0ea68718e4c9af0a58db65748bf.exe 41dbbd3bf5a5f6146d7fee0dfa0430dd11cbf0ea68718e4c9af0a58db65748bf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41dbbd3bf5a5f6146d7fee0dfa0430dd11cbf0ea68718e4c9af0a58db65748bf.exe"C:\Users\Admin\AppData\Local\Temp\41dbbd3bf5a5f6146d7fee0dfa0430dd11cbf0ea68718e4c9af0a58db65748bf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\41dbbd3bf5a5f6146d7fee0dfa0430dd11cbf0ea68718e4c9af0a58db65748bf.exetear2⤵PID:2036