Analysis
-
max time kernel
14s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 19:14
Static task
static1
Behavioral task
behavioral1
Sample
b2ed4f86e4b45868ba99d68119bf4c47325fcabd1b2d5ed93110d0d67a0f6aa9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b2ed4f86e4b45868ba99d68119bf4c47325fcabd1b2d5ed93110d0d67a0f6aa9.exe
Resource
win10v2004-20220901-en
General
-
Target
b2ed4f86e4b45868ba99d68119bf4c47325fcabd1b2d5ed93110d0d67a0f6aa9.exe
-
Size
1.5MB
-
MD5
9679462fab57beb89bdd7ef66ab7ca9d
-
SHA1
2eae43cf24374a45575f7fad0ba07c2772f5cc1d
-
SHA256
b2ed4f86e4b45868ba99d68119bf4c47325fcabd1b2d5ed93110d0d67a0f6aa9
-
SHA512
74cf8cd2649443fb5595e40469c9047bf685bd0d52ef85ed2641fe59c5a2e8affabeb0531aa1e600cae085538e152f48df9cc05d2336aee22cf4c61917f2266d
-
SSDEEP
24576:SU2nyny8p2Q6ZULBvVIphaoAxejPdlESdKkIh8R2ejYM7byXgzwX+0Ue12iBdghC:SU9U3Q4wXjj1LBdg7wST7+Sw4K7Onisw
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 268 wrote to memory of 1076 268 b2ed4f86e4b45868ba99d68119bf4c47325fcabd1b2d5ed93110d0d67a0f6aa9.exe 28 PID 268 wrote to memory of 1076 268 b2ed4f86e4b45868ba99d68119bf4c47325fcabd1b2d5ed93110d0d67a0f6aa9.exe 28 PID 268 wrote to memory of 1076 268 b2ed4f86e4b45868ba99d68119bf4c47325fcabd1b2d5ed93110d0d67a0f6aa9.exe 28 PID 268 wrote to memory of 1076 268 b2ed4f86e4b45868ba99d68119bf4c47325fcabd1b2d5ed93110d0d67a0f6aa9.exe 28 PID 268 wrote to memory of 1076 268 b2ed4f86e4b45868ba99d68119bf4c47325fcabd1b2d5ed93110d0d67a0f6aa9.exe 28 PID 268 wrote to memory of 1076 268 b2ed4f86e4b45868ba99d68119bf4c47325fcabd1b2d5ed93110d0d67a0f6aa9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2ed4f86e4b45868ba99d68119bf4c47325fcabd1b2d5ed93110d0d67a0f6aa9.exe"C:\Users\Admin\AppData\Local\Temp\b2ed4f86e4b45868ba99d68119bf4c47325fcabd1b2d5ed93110d0d67a0f6aa9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Local\Temp\b2ed4f86e4b45868ba99d68119bf4c47325fcabd1b2d5ed93110d0d67a0f6aa9.exe"C:\Users\Admin\AppData\Local\Temp\b2ed4f86e4b45868ba99d68119bf4c47325fcabd1b2d5ed93110d0d67a0f6aa9.exe"2⤵PID:1076
-