Analysis
-
max time kernel
41s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
becc8e9d65c08215693663d6e077f992b2a9b14c54409e43c90cfd9a72549e65.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
becc8e9d65c08215693663d6e077f992b2a9b14c54409e43c90cfd9a72549e65.exe
Resource
win10v2004-20221111-en
General
-
Target
becc8e9d65c08215693663d6e077f992b2a9b14c54409e43c90cfd9a72549e65.exe
-
Size
525KB
-
MD5
ee48926e10bc65acd7c9e06c0878637e
-
SHA1
1a6a2a908291474688048f87d34777d2a6cf433b
-
SHA256
becc8e9d65c08215693663d6e077f992b2a9b14c54409e43c90cfd9a72549e65
-
SHA512
9ce8e5905675ad9123faa09187374db9e35577b270ba5b367d8b5df71993bfafba8213a59db1451afbbdfc42195a0139da0e22e0f60c0e65b603b017a10c59f9
-
SSDEEP
6144:62Z9hs5MMYVQUTQDAt7FHXs+HmRS3HdWq54C1A6gaaePQuCJV5NhloBI0EUIP66W:62ZPWU1RF3gSXdWa445/A+6S0T
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1104 1948 becc8e9d65c08215693663d6e077f992b2a9b14c54409e43c90cfd9a72549e65.exe 28 PID 1948 wrote to memory of 1104 1948 becc8e9d65c08215693663d6e077f992b2a9b14c54409e43c90cfd9a72549e65.exe 28 PID 1948 wrote to memory of 1104 1948 becc8e9d65c08215693663d6e077f992b2a9b14c54409e43c90cfd9a72549e65.exe 28 PID 1948 wrote to memory of 1104 1948 becc8e9d65c08215693663d6e077f992b2a9b14c54409e43c90cfd9a72549e65.exe 28 PID 1948 wrote to memory of 972 1948 becc8e9d65c08215693663d6e077f992b2a9b14c54409e43c90cfd9a72549e65.exe 29 PID 1948 wrote to memory of 972 1948 becc8e9d65c08215693663d6e077f992b2a9b14c54409e43c90cfd9a72549e65.exe 29 PID 1948 wrote to memory of 972 1948 becc8e9d65c08215693663d6e077f992b2a9b14c54409e43c90cfd9a72549e65.exe 29 PID 1948 wrote to memory of 972 1948 becc8e9d65c08215693663d6e077f992b2a9b14c54409e43c90cfd9a72549e65.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\becc8e9d65c08215693663d6e077f992b2a9b14c54409e43c90cfd9a72549e65.exe"C:\Users\Admin\AppData\Local\Temp\becc8e9d65c08215693663d6e077f992b2a9b14c54409e43c90cfd9a72549e65.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\becc8e9d65c08215693663d6e077f992b2a9b14c54409e43c90cfd9a72549e65.exestart2⤵PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\becc8e9d65c08215693663d6e077f992b2a9b14c54409e43c90cfd9a72549e65.exewatch2⤵PID:972
-