Analysis
-
max time kernel
36s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:54
Static task
static1
Behavioral task
behavioral1
Sample
9e05691aa587a258b1224c14406028e7a41512a1f8c36ddcd3b006d363985a95.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9e05691aa587a258b1224c14406028e7a41512a1f8c36ddcd3b006d363985a95.exe
Resource
win10v2004-20220812-en
General
-
Target
9e05691aa587a258b1224c14406028e7a41512a1f8c36ddcd3b006d363985a95.exe
-
Size
36KB
-
MD5
155b49af1058641041fa6c47dd9db6e4
-
SHA1
92945dd2d73df37ca4a38453e873d29d6f7cc2a6
-
SHA256
9e05691aa587a258b1224c14406028e7a41512a1f8c36ddcd3b006d363985a95
-
SHA512
ad57362de0c51d2854650a4fabbee31a1074d96e5f601d345a2af0f9fcc572a0ebce7e0f3fd47ba15393ab4fe6f86efc53e80ee1d0241e67ec9fe283dc9b2edb
-
SSDEEP
384:cHP1qaBKxCd7PpLjzKb29lKDYyKsez8/tl:cHPdBKYXx48zso8/tl
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
9e05691aa587a258b1224c14406028e7a41512a1f8c36ddcd3b006d363985a95.exedescription pid process target process PID 1508 wrote to memory of 1720 1508 9e05691aa587a258b1224c14406028e7a41512a1f8c36ddcd3b006d363985a95.exe rundll32.exe PID 1508 wrote to memory of 1720 1508 9e05691aa587a258b1224c14406028e7a41512a1f8c36ddcd3b006d363985a95.exe rundll32.exe PID 1508 wrote to memory of 1720 1508 9e05691aa587a258b1224c14406028e7a41512a1f8c36ddcd3b006d363985a95.exe rundll32.exe PID 1508 wrote to memory of 1720 1508 9e05691aa587a258b1224c14406028e7a41512a1f8c36ddcd3b006d363985a95.exe rundll32.exe PID 1508 wrote to memory of 1720 1508 9e05691aa587a258b1224c14406028e7a41512a1f8c36ddcd3b006d363985a95.exe rundll32.exe PID 1508 wrote to memory of 1720 1508 9e05691aa587a258b1224c14406028e7a41512a1f8c36ddcd3b006d363985a95.exe rundll32.exe PID 1508 wrote to memory of 1720 1508 9e05691aa587a258b1224c14406028e7a41512a1f8c36ddcd3b006d363985a95.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e05691aa587a258b1224c14406028e7a41512a1f8c36ddcd3b006d363985a95.exe"C:\Users\Admin\AppData\Local\Temp\9e05691aa587a258b1224c14406028e7a41512a1f8c36ddcd3b006d363985a95.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\WINDOWS\system32\ipgvgvakhq.sd,mymain2⤵PID:1720