Analysis
-
max time kernel
37s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:36
Static task
static1
Behavioral task
behavioral1
Sample
35451588ad1d90e6616695be56ab41b60e79535e35d06d8f7410869bc77fa6f8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35451588ad1d90e6616695be56ab41b60e79535e35d06d8f7410869bc77fa6f8.exe
Resource
win10v2004-20220901-en
General
-
Target
35451588ad1d90e6616695be56ab41b60e79535e35d06d8f7410869bc77fa6f8.exe
-
Size
524KB
-
MD5
afb49d9f14ae55c0d01cb88ec6479060
-
SHA1
6cc325a21f465c696a9a2833e7c73e07312fa8f1
-
SHA256
35451588ad1d90e6616695be56ab41b60e79535e35d06d8f7410869bc77fa6f8
-
SHA512
a2eb49fbea781b570c80fbfe9cbcb31e7864d3408ce6fd7b268b69de4bab50f7d5c66a10c326f32610f94d6c10dc089ebca0e42b5db883af99df36706bf1acc7
-
SSDEEP
6144:NKiCZ9ueXhpe44QcioqJid8tZnzvCdLtXYizIvayFKZKvCECBZvBVF8X2Vx2FBaT:W3LXO0ciqdfNMFirVzvBVKXCuapzDBG
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
35451588ad1d90e6616695be56ab41b60e79535e35d06d8f7410869bc77fa6f8.exedescription pid process target process PID 1404 wrote to memory of 1016 1404 35451588ad1d90e6616695be56ab41b60e79535e35d06d8f7410869bc77fa6f8.exe 35451588ad1d90e6616695be56ab41b60e79535e35d06d8f7410869bc77fa6f8.exe PID 1404 wrote to memory of 1016 1404 35451588ad1d90e6616695be56ab41b60e79535e35d06d8f7410869bc77fa6f8.exe 35451588ad1d90e6616695be56ab41b60e79535e35d06d8f7410869bc77fa6f8.exe PID 1404 wrote to memory of 1016 1404 35451588ad1d90e6616695be56ab41b60e79535e35d06d8f7410869bc77fa6f8.exe 35451588ad1d90e6616695be56ab41b60e79535e35d06d8f7410869bc77fa6f8.exe PID 1404 wrote to memory of 1016 1404 35451588ad1d90e6616695be56ab41b60e79535e35d06d8f7410869bc77fa6f8.exe 35451588ad1d90e6616695be56ab41b60e79535e35d06d8f7410869bc77fa6f8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35451588ad1d90e6616695be56ab41b60e79535e35d06d8f7410869bc77fa6f8.exe"C:\Users\Admin\AppData\Local\Temp\35451588ad1d90e6616695be56ab41b60e79535e35d06d8f7410869bc77fa6f8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\35451588ad1d90e6616695be56ab41b60e79535e35d06d8f7410869bc77fa6f8.exetear2⤵PID:1016