Analysis
-
max time kernel
64s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe
Resource
win10v2004-20220901-en
General
-
Target
444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe
-
Size
522KB
-
MD5
5aebb8fc496fbb2a4e0d16de73aa1f56
-
SHA1
8a953e895b5af40684d792da4b94a7aa57a1d1f2
-
SHA256
444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e
-
SHA512
8f239f81564af02fc8b1db54e44b5a6c4f6051b3834961add0cfcbe24577b627f8fc33215c8db7b8c3b5511d1cdcbc8023341f870013209da27b8c276ff05abe
-
SSDEEP
12288:CBmDUR0AvjHTGdsdIXbb/+Xy18xQqpx8O5f:CwDU3TTFdIrbiatqpx8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1092 wrote to memory of 1704 1092 444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe 27 PID 1092 wrote to memory of 1704 1092 444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe 27 PID 1092 wrote to memory of 1704 1092 444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe 27 PID 1092 wrote to memory of 1704 1092 444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe 27 PID 1092 wrote to memory of 1704 1092 444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe 27 PID 1092 wrote to memory of 1704 1092 444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe 27 PID 1092 wrote to memory of 1704 1092 444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe 27 PID 1092 wrote to memory of 896 1092 444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe 28 PID 1092 wrote to memory of 896 1092 444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe 28 PID 1092 wrote to memory of 896 1092 444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe 28 PID 1092 wrote to memory of 896 1092 444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe 28 PID 1092 wrote to memory of 896 1092 444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe 28 PID 1092 wrote to memory of 896 1092 444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe 28 PID 1092 wrote to memory of 896 1092 444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe"C:\Users\Admin\AppData\Local\Temp\444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exestart2⤵PID:1704
-
-
C:\Users\Admin\AppData\Local\Temp\444312c89c7a915934c34336f519ac46803dfcbc3b0c295738b302c35335854e.exewatch2⤵PID:896
-