Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 05:59
Static task
static1
Behavioral task
behavioral1
Sample
2eaa6aa34abce7ef89254dc72a9c7cb186691c4f186848ab3a9db307d982f4d7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2eaa6aa34abce7ef89254dc72a9c7cb186691c4f186848ab3a9db307d982f4d7.exe
Resource
win10v2004-20221111-en
General
-
Target
2eaa6aa34abce7ef89254dc72a9c7cb186691c4f186848ab3a9db307d982f4d7.exe
-
Size
56KB
-
MD5
ead031d26827197540f4991f0a4c931a
-
SHA1
cbb8c38aad8fa0dd43776357cf90b61db95a1145
-
SHA256
2eaa6aa34abce7ef89254dc72a9c7cb186691c4f186848ab3a9db307d982f4d7
-
SHA512
7ff26ef18d4cc6bd5a25fbbb35a6060fe8b39a8cf5e43f2f7efacfe17e89db7be769952ef885699b6a9019c26be98f37d6763ef5f864ddbf5d0e842554368981
-
SSDEEP
768:/77lK7iCqy8nnLjY/4tKNECi9w3xv0wH+3L5ZhBMmBU5ymjaHPFCgTenuVMMs:DEmCqy8PRj83xskqL5ZDpgavVTskg
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1964 2012 2eaa6aa34abce7ef89254dc72a9c7cb186691c4f186848ab3a9db307d982f4d7.exe 28 PID 2012 wrote to memory of 1964 2012 2eaa6aa34abce7ef89254dc72a9c7cb186691c4f186848ab3a9db307d982f4d7.exe 28 PID 2012 wrote to memory of 1964 2012 2eaa6aa34abce7ef89254dc72a9c7cb186691c4f186848ab3a9db307d982f4d7.exe 28 PID 2012 wrote to memory of 1964 2012 2eaa6aa34abce7ef89254dc72a9c7cb186691c4f186848ab3a9db307d982f4d7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2eaa6aa34abce7ef89254dc72a9c7cb186691c4f186848ab3a9db307d982f4d7.exe"C:\Users\Admin\AppData\Local\Temp\2eaa6aa34abce7ef89254dc72a9c7cb186691c4f186848ab3a9db307d982f4d7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\2eaa6aa34abce7ef89254dc72a9c7cb186691c4f186848ab3a9db307d982f4d7.exeC:\Users\Admin\AppData\Local\Temp\2eaa6aa34abce7ef8" 482⤵PID:1964
-