Analysis
-
max time kernel
25s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
3ba12b1c75780969b3982f017b378b3cee3c2fdf1253d7f2edd7754dd5e39091.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3ba12b1c75780969b3982f017b378b3cee3c2fdf1253d7f2edd7754dd5e39091.exe
Resource
win10v2004-20221111-en
General
-
Target
3ba12b1c75780969b3982f017b378b3cee3c2fdf1253d7f2edd7754dd5e39091.exe
-
Size
507KB
-
MD5
58ce4658a93f5fc88e54557635a62bdb
-
SHA1
4b376ed7df11162e19b3df76ea1bfc3327d5e3af
-
SHA256
3ba12b1c75780969b3982f017b378b3cee3c2fdf1253d7f2edd7754dd5e39091
-
SHA512
b631b7101698c7532331590c78a6b2a31974737aef47909874d1c09bc03198f0fb734b2e155f4d7cb4c62e8cc2d40da98a36d36e2b037b6486e7cf47c17e2ba8
-
SSDEEP
6144:O+2vpVROK27uEUUko3HA8JpvbU3GkdgqYXkM+Bt4tftihCjuvFnvT+CzIcN5fcFm:j2hdlDo3Fvw33qhS/wfqdn3z4IdW
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 360 wrote to memory of 680 360 3ba12b1c75780969b3982f017b378b3cee3c2fdf1253d7f2edd7754dd5e39091.exe 28 PID 360 wrote to memory of 680 360 3ba12b1c75780969b3982f017b378b3cee3c2fdf1253d7f2edd7754dd5e39091.exe 28 PID 360 wrote to memory of 680 360 3ba12b1c75780969b3982f017b378b3cee3c2fdf1253d7f2edd7754dd5e39091.exe 28 PID 360 wrote to memory of 680 360 3ba12b1c75780969b3982f017b378b3cee3c2fdf1253d7f2edd7754dd5e39091.exe 28 PID 360 wrote to memory of 764 360 3ba12b1c75780969b3982f017b378b3cee3c2fdf1253d7f2edd7754dd5e39091.exe 29 PID 360 wrote to memory of 764 360 3ba12b1c75780969b3982f017b378b3cee3c2fdf1253d7f2edd7754dd5e39091.exe 29 PID 360 wrote to memory of 764 360 3ba12b1c75780969b3982f017b378b3cee3c2fdf1253d7f2edd7754dd5e39091.exe 29 PID 360 wrote to memory of 764 360 3ba12b1c75780969b3982f017b378b3cee3c2fdf1253d7f2edd7754dd5e39091.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ba12b1c75780969b3982f017b378b3cee3c2fdf1253d7f2edd7754dd5e39091.exe"C:\Users\Admin\AppData\Local\Temp\3ba12b1c75780969b3982f017b378b3cee3c2fdf1253d7f2edd7754dd5e39091.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Users\Admin\AppData\Local\Temp\3ba12b1c75780969b3982f017b378b3cee3c2fdf1253d7f2edd7754dd5e39091.exestart2⤵PID:680
-
-
C:\Users\Admin\AppData\Local\Temp\3ba12b1c75780969b3982f017b378b3cee3c2fdf1253d7f2edd7754dd5e39091.exewatch2⤵PID:764
-