Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
579a9765c49b98a0dd905002c5e67b810ae9d5571419f0b0ce54e57974a7d01e.exe
Resource
win7-20220901-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
579a9765c49b98a0dd905002c5e67b810ae9d5571419f0b0ce54e57974a7d01e.exe
Resource
win10v2004-20220901-en
1 signatures
150 seconds
General
-
Target
579a9765c49b98a0dd905002c5e67b810ae9d5571419f0b0ce54e57974a7d01e.exe
-
Size
523KB
-
MD5
dd690dc3f41e2ce56a735af7990cc838
-
SHA1
4540c4ce769cc5f519f583dfd31c50f183e490ca
-
SHA256
579a9765c49b98a0dd905002c5e67b810ae9d5571419f0b0ce54e57974a7d01e
-
SHA512
c193398adfd4eedea83bc99cb81696208dd2a321969e0994335d372bee3893dedbdb31c32bd20986c37810e3432bb277bafd391b0ad389b1f173a3902d702819
-
SSDEEP
12288:hJzBeJygF7/V/lqYLM1QJebHgfrSR1Tc3:hfexFr7qleMBc
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1696 1352 579a9765c49b98a0dd905002c5e67b810ae9d5571419f0b0ce54e57974a7d01e.exe 26 PID 1352 wrote to memory of 1696 1352 579a9765c49b98a0dd905002c5e67b810ae9d5571419f0b0ce54e57974a7d01e.exe 26 PID 1352 wrote to memory of 1696 1352 579a9765c49b98a0dd905002c5e67b810ae9d5571419f0b0ce54e57974a7d01e.exe 26 PID 1352 wrote to memory of 1696 1352 579a9765c49b98a0dd905002c5e67b810ae9d5571419f0b0ce54e57974a7d01e.exe 26 PID 1352 wrote to memory of 1696 1352 579a9765c49b98a0dd905002c5e67b810ae9d5571419f0b0ce54e57974a7d01e.exe 26 PID 1352 wrote to memory of 1696 1352 579a9765c49b98a0dd905002c5e67b810ae9d5571419f0b0ce54e57974a7d01e.exe 26 PID 1352 wrote to memory of 1696 1352 579a9765c49b98a0dd905002c5e67b810ae9d5571419f0b0ce54e57974a7d01e.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\579a9765c49b98a0dd905002c5e67b810ae9d5571419f0b0ce54e57974a7d01e.exe"C:\Users\Admin\AppData\Local\Temp\579a9765c49b98a0dd905002c5e67b810ae9d5571419f0b0ce54e57974a7d01e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\579a9765c49b98a0dd905002c5e67b810ae9d5571419f0b0ce54e57974a7d01e.exetear2⤵PID:1696
-