Analysis
-
max time kernel
63s -
max time network
71s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 07:38
Static task
static1
Behavioral task
behavioral1
Sample
b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe
Resource
win10v2004-20221111-en
General
-
Target
b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe
-
Size
526KB
-
MD5
a1ffd5e47892e392523152b625fd185f
-
SHA1
fbc1ab6982c1633156ff751c8b3c10208a49fb7a
-
SHA256
b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee
-
SHA512
0b471055c5708f47fea0a8194f8c2ad597bf84b6602573b72000c9abc69974e0eed73e30b35df3dbdc0a1223dde23de65edf37291dac507df11bb8601926d4e4
-
SSDEEP
12288:O7X44m6dPjwB3rDAzxo4xUupSMrFCsNEfF4SXh:O7o+RMpAG4quouFCsNaHXh
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exedescription pid process target process PID 2012 wrote to memory of 1364 2012 b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe PID 2012 wrote to memory of 1364 2012 b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe PID 2012 wrote to memory of 1364 2012 b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe PID 2012 wrote to memory of 1364 2012 b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe PID 2012 wrote to memory of 1364 2012 b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe PID 2012 wrote to memory of 1364 2012 b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe PID 2012 wrote to memory of 1364 2012 b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe PID 2012 wrote to memory of 1952 2012 b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe PID 2012 wrote to memory of 1952 2012 b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe PID 2012 wrote to memory of 1952 2012 b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe PID 2012 wrote to memory of 1952 2012 b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe PID 2012 wrote to memory of 1952 2012 b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe PID 2012 wrote to memory of 1952 2012 b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe PID 2012 wrote to memory of 1952 2012 b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe"C:\Users\Admin\AppData\Local\Temp\b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exestart2⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\b9a980e7e19e648849e36df1d48630cff3b53959cb07928e641219b0387eb4ee.exewatch2⤵PID:1952