Analysis
-
max time kernel
31s -
max time network
61s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 07:50
Static task
static1
Behavioral task
behavioral1
Sample
1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe
Resource
win10v2004-20220812-en
General
-
Target
1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe
-
Size
522KB
-
MD5
357c7141ed74af607164f15bd218d5c7
-
SHA1
20f59bd43c050fca0030aa48b034793e7d150812
-
SHA256
1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795
-
SHA512
35dc9747ff8649dd3f6ba9941f198accba9b46b46c866dfe6606f98be6902201e0fd795958f00d537819405ea9c612fca0686fbcc5f484fc7b4dec3e535413c4
-
SSDEEP
12288:EZCAtEbNchq89/ceNGdYdy18xQqpx8O5B9856C:UREJQ+Yatqpx8P5
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exedescription pid process target process PID 2040 wrote to memory of 1984 2040 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe PID 2040 wrote to memory of 1984 2040 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe PID 2040 wrote to memory of 1984 2040 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe PID 2040 wrote to memory of 1984 2040 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe PID 2040 wrote to memory of 1984 2040 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe PID 2040 wrote to memory of 1984 2040 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe PID 2040 wrote to memory of 1984 2040 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe PID 2040 wrote to memory of 1968 2040 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe PID 2040 wrote to memory of 1968 2040 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe PID 2040 wrote to memory of 1968 2040 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe PID 2040 wrote to memory of 1968 2040 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe PID 2040 wrote to memory of 1968 2040 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe PID 2040 wrote to memory of 1968 2040 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe PID 2040 wrote to memory of 1968 2040 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe 1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe"C:\Users\Admin\AppData\Local\Temp\1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exestart2⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\1fd6df5efff303ba931b8b6899c395999bbd98430f8e5b21fa062e10f4544795.exewatch2⤵PID:1968