Analysis
-
max time kernel
47s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:12
Static task
static1
Behavioral task
behavioral1
Sample
a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe
Resource
win10v2004-20221111-en
General
-
Target
a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe
-
Size
686KB
-
MD5
7ee3a5f8af0b7d037d0d1362258c3d14
-
SHA1
fa7fd63b302b5b0b66941fd18e1557fbf34c5f56
-
SHA256
a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24
-
SHA512
97dd00eee5bab4164e468165cb440b76f145f8b22ddd0e0b7386182feb66b59033db83a29ef1d41df24d0dfa51ed5b923f9891763718e8abcffdb3dc69fe6a7d
-
SSDEEP
6144:U/wVwZ9rA5zaQdNi9A4DHWHHCJ7g2v2sE6K0m8NTZnBa6JZpPcfEG9vVmCB7ol3S:80MABPTF4DMT5SZo5BslIHXQp1Jg
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exedescription pid process target process PID 1264 wrote to memory of 1224 1264 a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe PID 1264 wrote to memory of 1224 1264 a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe PID 1264 wrote to memory of 1224 1264 a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe PID 1264 wrote to memory of 1224 1264 a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe PID 1264 wrote to memory of 2028 1264 a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe PID 1264 wrote to memory of 2028 1264 a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe PID 1264 wrote to memory of 2028 1264 a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe PID 1264 wrote to memory of 2028 1264 a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe"C:\Users\Admin\AppData\Local\Temp\a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exestart2⤵PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\a2cdb8b3e6794d0c94bcbfbd87998e0424aa4d7e20a18460338a286f112c6d24.exewatch2⤵PID:2028
-