Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
70c8cd91ceb6bea649d9fd419f11c7e364e7cc4cd259d079b14536873d06fa03.exe
Resource
win7-20220901-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
70c8cd91ceb6bea649d9fd419f11c7e364e7cc4cd259d079b14536873d06fa03.exe
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
70c8cd91ceb6bea649d9fd419f11c7e364e7cc4cd259d079b14536873d06fa03.exe
-
Size
507KB
-
MD5
78609621e5fd59f7ad47e1dfab4980eb
-
SHA1
fc47bbc64afeeab262f7cca61fec48a708bc010f
-
SHA256
70c8cd91ceb6bea649d9fd419f11c7e364e7cc4cd259d079b14536873d06fa03
-
SHA512
4cbaa08894c2428715a917e76d3d94d4ec1f5d66699928509141319324b4a74b99de806845822b980948e66ee55b5e77a6cf34d8af46044062270fd525aea701
-
SSDEEP
12288:WlUFTwOWTL2VpkoYes1rdAL8UdeDz4P9dW:WlmwJ3Nzga49Y
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1388 1048 70c8cd91ceb6bea649d9fd419f11c7e364e7cc4cd259d079b14536873d06fa03.exe 28 PID 1048 wrote to memory of 1388 1048 70c8cd91ceb6bea649d9fd419f11c7e364e7cc4cd259d079b14536873d06fa03.exe 28 PID 1048 wrote to memory of 1388 1048 70c8cd91ceb6bea649d9fd419f11c7e364e7cc4cd259d079b14536873d06fa03.exe 28 PID 1048 wrote to memory of 1388 1048 70c8cd91ceb6bea649d9fd419f11c7e364e7cc4cd259d079b14536873d06fa03.exe 28 PID 1048 wrote to memory of 2012 1048 70c8cd91ceb6bea649d9fd419f11c7e364e7cc4cd259d079b14536873d06fa03.exe 27 PID 1048 wrote to memory of 2012 1048 70c8cd91ceb6bea649d9fd419f11c7e364e7cc4cd259d079b14536873d06fa03.exe 27 PID 1048 wrote to memory of 2012 1048 70c8cd91ceb6bea649d9fd419f11c7e364e7cc4cd259d079b14536873d06fa03.exe 27 PID 1048 wrote to memory of 2012 1048 70c8cd91ceb6bea649d9fd419f11c7e364e7cc4cd259d079b14536873d06fa03.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\70c8cd91ceb6bea649d9fd419f11c7e364e7cc4cd259d079b14536873d06fa03.exe"C:\Users\Admin\AppData\Local\Temp\70c8cd91ceb6bea649d9fd419f11c7e364e7cc4cd259d079b14536873d06fa03.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\70c8cd91ceb6bea649d9fd419f11c7e364e7cc4cd259d079b14536873d06fa03.exewatch2⤵PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\70c8cd91ceb6bea649d9fd419f11c7e364e7cc4cd259d079b14536873d06fa03.exestart2⤵PID:1388
-