Analysis
-
max time kernel
16s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:57
Static task
static1
Behavioral task
behavioral1
Sample
f34585cdcb812d25065b7e090f17a4696b1c0ef9e988a78ffa15f0b2e730352a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f34585cdcb812d25065b7e090f17a4696b1c0ef9e988a78ffa15f0b2e730352a.exe
Resource
win10v2004-20220812-en
General
-
Target
f34585cdcb812d25065b7e090f17a4696b1c0ef9e988a78ffa15f0b2e730352a.exe
-
Size
76KB
-
MD5
52723d4e7d2fd70fb16fd3f2763af000
-
SHA1
f2361ace84afe0519aacf6c675385042be73e46f
-
SHA256
f34585cdcb812d25065b7e090f17a4696b1c0ef9e988a78ffa15f0b2e730352a
-
SHA512
f519227099aa20d0bf79670003a559f4f362af69e78de8d795ec1500600e5fdbaa0790543ae4e230cc0d26da812becf2bb6167a19cea2d43f0deef0c6797d21c
-
SSDEEP
768:+AIEx8VzSbojDg4RCCEu6P4pYBUNRB0kArSQYIyEyHHc5Z3ebbvxDG8cZGj8RrvN:+NEWXRsCgicuUMF9gZGj+RN
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 932 f34585cdcb812d25065b7e090f17a4696b1c0ef9e988a78ffa15f0b2e730352a.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 932 wrote to memory of 1484 932 f34585cdcb812d25065b7e090f17a4696b1c0ef9e988a78ffa15f0b2e730352a.exe 28 PID 932 wrote to memory of 1484 932 f34585cdcb812d25065b7e090f17a4696b1c0ef9e988a78ffa15f0b2e730352a.exe 28 PID 932 wrote to memory of 1484 932 f34585cdcb812d25065b7e090f17a4696b1c0ef9e988a78ffa15f0b2e730352a.exe 28 PID 932 wrote to memory of 1484 932 f34585cdcb812d25065b7e090f17a4696b1c0ef9e988a78ffa15f0b2e730352a.exe 28 PID 932 wrote to memory of 1484 932 f34585cdcb812d25065b7e090f17a4696b1c0ef9e988a78ffa15f0b2e730352a.exe 28 PID 932 wrote to memory of 1484 932 f34585cdcb812d25065b7e090f17a4696b1c0ef9e988a78ffa15f0b2e730352a.exe 28 PID 932 wrote to memory of 1484 932 f34585cdcb812d25065b7e090f17a4696b1c0ef9e988a78ffa15f0b2e730352a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f34585cdcb812d25065b7e090f17a4696b1c0ef9e988a78ffa15f0b2e730352a.exe"C:\Users\Admin\AppData\Local\Temp\f34585cdcb812d25065b7e090f17a4696b1c0ef9e988a78ffa15f0b2e730352a.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\f34585cdcb812d25065b7e090f17a4696b1c0ef9e988a78ffa15f0b2e730352a.exee|2⤵PID:1484
-