Analysis
-
max time kernel
52s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:44
Static task
static1
Behavioral task
behavioral1
Sample
dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe
Resource
win10v2004-20221111-en
General
-
Target
dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe
-
Size
523KB
-
MD5
04b357d870d9160ff3a8fdc8214bc19a
-
SHA1
4994db0fc8a7afe20ad812d74b78f040d7d2fc35
-
SHA256
dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090
-
SHA512
96eca1581ea83f407884386d570c26dc5515707e105bb13f55540ed05111606ae51ee215a0d4e94bb077ffb375f8691343cd98ef2671301c049e3729b78cb6ce
-
SSDEEP
12288:mZJvi/LMflRx39dwvwZYQ8/EIBNvNMCsl4K30pipl:mvi/4dv39dIwUVKCseK3Rp
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exedescription pid process target process PID 1892 wrote to memory of 2020 1892 dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe PID 1892 wrote to memory of 2020 1892 dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe PID 1892 wrote to memory of 2020 1892 dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe PID 1892 wrote to memory of 2020 1892 dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe PID 1892 wrote to memory of 2020 1892 dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe PID 1892 wrote to memory of 2020 1892 dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe PID 1892 wrote to memory of 2020 1892 dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe"C:\Users\Admin\AppData\Local\Temp\dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\dc8b4dccd08d28e8a8590eccb9cfb2a542a66ca8f1bd5324f6b72a70cbfb2090.exetear2⤵PID:2020