Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 22:43
Static task
static1
Behavioral task
behavioral1
Sample
533c3ef8f458164f749ebd0632d9c6a2e5ab803304e18f910e86f891daaf9efb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
533c3ef8f458164f749ebd0632d9c6a2e5ab803304e18f910e86f891daaf9efb.exe
Resource
win10v2004-20221111-en
General
-
Target
533c3ef8f458164f749ebd0632d9c6a2e5ab803304e18f910e86f891daaf9efb.exe
-
Size
535KB
-
MD5
c58bb178b80e41c6acd68cc037974837
-
SHA1
8d4a84a8eb3dba789040d2eb352e76f9ea8e919a
-
SHA256
533c3ef8f458164f749ebd0632d9c6a2e5ab803304e18f910e86f891daaf9efb
-
SHA512
defda3e5c9fdfa53fc37f3b8e05c80404f8e814499b08221df54081672826366e26385a5c42fb72c1ff09caea99341d04667842c7e1cc6134c1547c4d36195e7
-
SSDEEP
12288:ajhZ9z7x4SXjImbFTdBVQQI5tn5Vk/w3xus16h+YzpYHRK:G/tImbFTdBVQQwnS0X16EMi8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2028 1908 533c3ef8f458164f749ebd0632d9c6a2e5ab803304e18f910e86f891daaf9efb.exe 28 PID 1908 wrote to memory of 2028 1908 533c3ef8f458164f749ebd0632d9c6a2e5ab803304e18f910e86f891daaf9efb.exe 28 PID 1908 wrote to memory of 2028 1908 533c3ef8f458164f749ebd0632d9c6a2e5ab803304e18f910e86f891daaf9efb.exe 28 PID 1908 wrote to memory of 2028 1908 533c3ef8f458164f749ebd0632d9c6a2e5ab803304e18f910e86f891daaf9efb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\533c3ef8f458164f749ebd0632d9c6a2e5ab803304e18f910e86f891daaf9efb.exe"C:\Users\Admin\AppData\Local\Temp\533c3ef8f458164f749ebd0632d9c6a2e5ab803304e18f910e86f891daaf9efb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\533c3ef8f458164f749ebd0632d9c6a2e5ab803304e18f910e86f891daaf9efb.exetear2⤵PID:2028
-