Analysis
-
max time kernel
19s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
a4e4e41e4b3ca41061eb54bac578df84510709b755ee87ae4def78bfd3405693.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4e4e41e4b3ca41061eb54bac578df84510709b755ee87ae4def78bfd3405693.exe
Resource
win10v2004-20221111-en
General
-
Target
a4e4e41e4b3ca41061eb54bac578df84510709b755ee87ae4def78bfd3405693.exe
-
Size
168KB
-
MD5
ca55a6ac862f9cd85524f925660ac9d3
-
SHA1
a0efdc29784cd080db616d2cf0d74ff09f827c4d
-
SHA256
a4e4e41e4b3ca41061eb54bac578df84510709b755ee87ae4def78bfd3405693
-
SHA512
93f8e2df6a4fc8d357759ffc475562d1d95559719a6bbd75ccdb135326e9a511473bc3f6647cae5948232f0c1843a0228e30f8983fb8041f779325d5a33cacf1
-
SSDEEP
3072:/gFI6IZjokLqGp1XJQmAH2UMtht0Cyrc/5Dc3wCZ437uyppftb:/i2p1XJQmoMS1rc/5DcAC437uyp7b
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 908 a4e4e41e4b3ca41061eb54bac578df84510709b755ee87ae4def78bfd3405693.exe 908 a4e4e41e4b3ca41061eb54bac578df84510709b755ee87ae4def78bfd3405693.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 908 wrote to memory of 1300 908 a4e4e41e4b3ca41061eb54bac578df84510709b755ee87ae4def78bfd3405693.exe 14 PID 908 wrote to memory of 1300 908 a4e4e41e4b3ca41061eb54bac578df84510709b755ee87ae4def78bfd3405693.exe 14 PID 908 wrote to memory of 1300 908 a4e4e41e4b3ca41061eb54bac578df84510709b755ee87ae4def78bfd3405693.exe 14 PID 908 wrote to memory of 1300 908 a4e4e41e4b3ca41061eb54bac578df84510709b755ee87ae4def78bfd3405693.exe 14 PID 908 wrote to memory of 1300 908 a4e4e41e4b3ca41061eb54bac578df84510709b755ee87ae4def78bfd3405693.exe 14 PID 908 wrote to memory of 1300 908 a4e4e41e4b3ca41061eb54bac578df84510709b755ee87ae4def78bfd3405693.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\a4e4e41e4b3ca41061eb54bac578df84510709b755ee87ae4def78bfd3405693.exe"C:\Users\Admin\AppData\Local\Temp\a4e4e41e4b3ca41061eb54bac578df84510709b755ee87ae4def78bfd3405693.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:908
-