Analysis
-
max time kernel
59s -
max time network
81s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
3f30695c94b30911b8576c9d1452d13b2c1d2f48b5f1d0b818a3dbcca5d5b38a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3f30695c94b30911b8576c9d1452d13b2c1d2f48b5f1d0b818a3dbcca5d5b38a.exe
Resource
win10v2004-20220901-en
General
-
Target
3f30695c94b30911b8576c9d1452d13b2c1d2f48b5f1d0b818a3dbcca5d5b38a.exe
-
Size
61KB
-
MD5
e363c335a1d6fb8e682a703dd22830d6
-
SHA1
c88eb2dc1d5ee679d5fe20864ff01af4f099f9e8
-
SHA256
3f30695c94b30911b8576c9d1452d13b2c1d2f48b5f1d0b818a3dbcca5d5b38a
-
SHA512
8c34b9495c7f227f6df73cb1bdc704d59a5cb92aa6dd6379176be117ed9aa30f95462c586d64800801efea0baac5ba5e414c6b63044c55a634f2e64cd4c8382b
-
SSDEEP
1536:kUL1EGCqj8/rfHQjrGgpMYTuYVRFQi3S9T+gt4yhOUvwrOSUN9PX:kECHQjrpPa+gJhOUvwrhUN9P
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1368 wrote to memory of 840 1368 3f30695c94b30911b8576c9d1452d13b2c1d2f48b5f1d0b818a3dbcca5d5b38a.exe 28 PID 1368 wrote to memory of 840 1368 3f30695c94b30911b8576c9d1452d13b2c1d2f48b5f1d0b818a3dbcca5d5b38a.exe 28 PID 1368 wrote to memory of 840 1368 3f30695c94b30911b8576c9d1452d13b2c1d2f48b5f1d0b818a3dbcca5d5b38a.exe 28 PID 1368 wrote to memory of 840 1368 3f30695c94b30911b8576c9d1452d13b2c1d2f48b5f1d0b818a3dbcca5d5b38a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f30695c94b30911b8576c9d1452d13b2c1d2f48b5f1d0b818a3dbcca5d5b38a.exe"C:\Users\Admin\AppData\Local\Temp\3f30695c94b30911b8576c9d1452d13b2c1d2f48b5f1d0b818a3dbcca5d5b38a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\3f30695c94b30911b8576c9d1452d13b2c1d2f48b5f1d0b818a3dbcca5d5b38a.exeC:\Users\Admin\AppData\Local\Temp\3f30695c94b30911b" 482⤵PID:840
-