Analysis
-
max time kernel
41s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
f04090af51e7798bcce28757931bd3df990d1f2f1725b6018e4bfd05e0ee2f96.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f04090af51e7798bcce28757931bd3df990d1f2f1725b6018e4bfd05e0ee2f96.exe
Resource
win10v2004-20220812-en
General
-
Target
f04090af51e7798bcce28757931bd3df990d1f2f1725b6018e4bfd05e0ee2f96.exe
-
Size
75KB
-
MD5
53520161443ca70ee7ba7d991b7532e5
-
SHA1
e1f428c6a88791b2adde9a74798e1c22f9e290fa
-
SHA256
f04090af51e7798bcce28757931bd3df990d1f2f1725b6018e4bfd05e0ee2f96
-
SHA512
2c9c7eda18013fdfcef01810a25cdc49d889ac6148073b06624627cda3119d95129b9e55532df8840ea5d3be91f58da85b96af0e9f3341dcf6604c7f7a282e10
-
SSDEEP
1536:Rj8d0qHjiifOBqvUlEhHJqt4yhOUvwrOSUN9PXKQJBV3L+lfDTw:Rj8d04iifO+hHJqJhOUvwrhUN9Pa4Bkw
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1188 wrote to memory of 1120 1188 f04090af51e7798bcce28757931bd3df990d1f2f1725b6018e4bfd05e0ee2f96.exe 28 PID 1188 wrote to memory of 1120 1188 f04090af51e7798bcce28757931bd3df990d1f2f1725b6018e4bfd05e0ee2f96.exe 28 PID 1188 wrote to memory of 1120 1188 f04090af51e7798bcce28757931bd3df990d1f2f1725b6018e4bfd05e0ee2f96.exe 28 PID 1188 wrote to memory of 1120 1188 f04090af51e7798bcce28757931bd3df990d1f2f1725b6018e4bfd05e0ee2f96.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f04090af51e7798bcce28757931bd3df990d1f2f1725b6018e4bfd05e0ee2f96.exe"C:\Users\Admin\AppData\Local\Temp\f04090af51e7798bcce28757931bd3df990d1f2f1725b6018e4bfd05e0ee2f96.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\f04090af51e7798bcce28757931bd3df990d1f2f1725b6018e4bfd05e0ee2f96.exe?2⤵PID:1120
-