Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
874204e2f9dad9e39f5afe9123fc7a99b5ff0f0246a26efd1f2ff201c29d7fed.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
874204e2f9dad9e39f5afe9123fc7a99b5ff0f0246a26efd1f2ff201c29d7fed.exe
Resource
win10v2004-20220812-en
General
-
Target
874204e2f9dad9e39f5afe9123fc7a99b5ff0f0246a26efd1f2ff201c29d7fed.exe
-
Size
101KB
-
MD5
411ea607b437730b0ba78a6acdcdd6c5
-
SHA1
3966ce9c0cd19252cc5d24c23033b237ec121687
-
SHA256
874204e2f9dad9e39f5afe9123fc7a99b5ff0f0246a26efd1f2ff201c29d7fed
-
SHA512
fce5f265d9917caa8795f538bfbc96660b6b47a3677ca08fe493a5409f9f25d0c4d33fb0df643a505273aff0fb4d9c911b7722e9fa118362edf90936d79958f3
-
SSDEEP
3072:neQx/9pLjd3r2yZD3Cfxk4siwfQKgwkjgErdrnU39mo:eQp/hFyfxL6fxTILrxnUNm
Malware Config
Signatures
-
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1280 874204e2f9dad9e39f5afe9123fc7a99b5ff0f0246a26efd1f2ff201c29d7fed.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1280 wrote to memory of 1268 1280 874204e2f9dad9e39f5afe9123fc7a99b5ff0f0246a26efd1f2ff201c29d7fed.exe 27 PID 1280 wrote to memory of 1268 1280 874204e2f9dad9e39f5afe9123fc7a99b5ff0f0246a26efd1f2ff201c29d7fed.exe 27 PID 1280 wrote to memory of 1268 1280 874204e2f9dad9e39f5afe9123fc7a99b5ff0f0246a26efd1f2ff201c29d7fed.exe 27 PID 1280 wrote to memory of 1268 1280 874204e2f9dad9e39f5afe9123fc7a99b5ff0f0246a26efd1f2ff201c29d7fed.exe 27 PID 1280 wrote to memory of 1268 1280 874204e2f9dad9e39f5afe9123fc7a99b5ff0f0246a26efd1f2ff201c29d7fed.exe 27 PID 1280 wrote to memory of 1268 1280 874204e2f9dad9e39f5afe9123fc7a99b5ff0f0246a26efd1f2ff201c29d7fed.exe 27 PID 1280 wrote to memory of 1268 1280 874204e2f9dad9e39f5afe9123fc7a99b5ff0f0246a26efd1f2ff201c29d7fed.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\874204e2f9dad9e39f5afe9123fc7a99b5ff0f0246a26efd1f2ff201c29d7fed.exe"C:\Users\Admin\AppData\Local\Temp\874204e2f9dad9e39f5afe9123fc7a99b5ff0f0246a26efd1f2ff201c29d7fed.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:1268
-