Analysis
-
max time kernel
30s -
max time network
81s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:29
Static task
static1
Behavioral task
behavioral1
Sample
4249bf89fd7d89c43b4a8ac72b404832f18926140fb50b8a86cda96ad9c477e2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4249bf89fd7d89c43b4a8ac72b404832f18926140fb50b8a86cda96ad9c477e2.exe
Resource
win10v2004-20221111-en
General
-
Target
4249bf89fd7d89c43b4a8ac72b404832f18926140fb50b8a86cda96ad9c477e2.exe
-
Size
524KB
-
MD5
7d4c6cbd47a0940c96c4f76c23a72057
-
SHA1
715af70b0bff55191f7016d626752abb8908f31a
-
SHA256
4249bf89fd7d89c43b4a8ac72b404832f18926140fb50b8a86cda96ad9c477e2
-
SHA512
a3ff2d0cee399e99fed685aa5d0ba4f30e0edaaabd956a5cdaf366915a80f8af4ff13130cb36d55b121fba251922320eb0501f9cc97131204241d2657191e411
-
SSDEEP
12288:/HaKogxoGzpJ1MNLMYLVzvBVKXCuapzDBG:/6KoWzb4M+VzvSXCXD
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
4249bf89fd7d89c43b4a8ac72b404832f18926140fb50b8a86cda96ad9c477e2.exedescription pid process target process PID 1472 wrote to memory of 772 1472 4249bf89fd7d89c43b4a8ac72b404832f18926140fb50b8a86cda96ad9c477e2.exe 4249bf89fd7d89c43b4a8ac72b404832f18926140fb50b8a86cda96ad9c477e2.exe PID 1472 wrote to memory of 772 1472 4249bf89fd7d89c43b4a8ac72b404832f18926140fb50b8a86cda96ad9c477e2.exe 4249bf89fd7d89c43b4a8ac72b404832f18926140fb50b8a86cda96ad9c477e2.exe PID 1472 wrote to memory of 772 1472 4249bf89fd7d89c43b4a8ac72b404832f18926140fb50b8a86cda96ad9c477e2.exe 4249bf89fd7d89c43b4a8ac72b404832f18926140fb50b8a86cda96ad9c477e2.exe PID 1472 wrote to memory of 772 1472 4249bf89fd7d89c43b4a8ac72b404832f18926140fb50b8a86cda96ad9c477e2.exe 4249bf89fd7d89c43b4a8ac72b404832f18926140fb50b8a86cda96ad9c477e2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4249bf89fd7d89c43b4a8ac72b404832f18926140fb50b8a86cda96ad9c477e2.exe"C:\Users\Admin\AppData\Local\Temp\4249bf89fd7d89c43b4a8ac72b404832f18926140fb50b8a86cda96ad9c477e2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\4249bf89fd7d89c43b4a8ac72b404832f18926140fb50b8a86cda96ad9c477e2.exetear2⤵PID:772