Analysis
-
max time kernel
40s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:44
Static task
static1
Behavioral task
behavioral1
Sample
53d7984e8151340ea51959e04d4de5c9eef8162cbd5fb280b260549f52113adb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
53d7984e8151340ea51959e04d4de5c9eef8162cbd5fb280b260549f52113adb.exe
Resource
win10v2004-20221111-en
General
-
Target
53d7984e8151340ea51959e04d4de5c9eef8162cbd5fb280b260549f52113adb.exe
-
Size
8KB
-
MD5
ca48b3c5ac628a0a8b882a1828bbe147
-
SHA1
6337012220591c8ea2f95368370aac01d4dda6cd
-
SHA256
53d7984e8151340ea51959e04d4de5c9eef8162cbd5fb280b260549f52113adb
-
SHA512
f01992f896d1f72a853a7ff55427d3266424cae25228db9ea6576de78e6e1a2d0a28955041209926a3f84c51cb13124062f111436a597567bad0988914f7a081
-
SSDEEP
96:2GxDY8dSsD1qVLHcaLFI1mhpC4zAjGhLz8F4an7rZMZ/8aHgGMyZzNt:7Ym7cLFIcLLzNhLoF4anfZKEK
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
53d7984e8151340ea51959e04d4de5c9eef8162cbd5fb280b260549f52113adb.exedescription pid process target process PID 1232 wrote to memory of 1488 1232 53d7984e8151340ea51959e04d4de5c9eef8162cbd5fb280b260549f52113adb.exe dw20.exe PID 1232 wrote to memory of 1488 1232 53d7984e8151340ea51959e04d4de5c9eef8162cbd5fb280b260549f52113adb.exe dw20.exe PID 1232 wrote to memory of 1488 1232 53d7984e8151340ea51959e04d4de5c9eef8162cbd5fb280b260549f52113adb.exe dw20.exe PID 1232 wrote to memory of 1488 1232 53d7984e8151340ea51959e04d4de5c9eef8162cbd5fb280b260549f52113adb.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53d7984e8151340ea51959e04d4de5c9eef8162cbd5fb280b260549f52113adb.exe"C:\Users\Admin\AppData\Local\Temp\53d7984e8151340ea51959e04d4de5c9eef8162cbd5fb280b260549f52113adb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9482⤵PID:1488