Analysis
-
max time kernel
197s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 11:31
Static task
static1
Behavioral task
behavioral1
Sample
edc5938cb70bd0ce20e99e323eea92e2c67bcfb7e3ff01100cb44b34d4b6c281.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
edc5938cb70bd0ce20e99e323eea92e2c67bcfb7e3ff01100cb44b34d4b6c281.exe
Resource
win10v2004-20220901-en
General
-
Target
edc5938cb70bd0ce20e99e323eea92e2c67bcfb7e3ff01100cb44b34d4b6c281.exe
-
Size
126KB
-
MD5
bed15c7e26d0c05ae5ae6a5ca3cbceb5
-
SHA1
7eb0191e3a5781e972028d130e0701143de32c2e
-
SHA256
edc5938cb70bd0ce20e99e323eea92e2c67bcfb7e3ff01100cb44b34d4b6c281
-
SHA512
fa42b9af6127fa9c1467084d1c9b5b540d9e71a72fcc403964446c57f49a2d56f8ce52434ab1ca3d26953392ec2da4fe443a235f2cd0c12806030622f3886838
-
SSDEEP
1536:FkQhSDQZ4cdBEUokKqpRxG9oJon9wafZaackC6Es8lWOTsg11bw+45JrPj2Bydng:JOOSfZavkdg1i+Cb2RXH
Malware Config
Signatures
-
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1340 edc5938cb70bd0ce20e99e323eea92e2c67bcfb7e3ff01100cb44b34d4b6c281.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1340 wrote to memory of 428 1340 edc5938cb70bd0ce20e99e323eea92e2c67bcfb7e3ff01100cb44b34d4b6c281.exe 27 PID 1340 wrote to memory of 428 1340 edc5938cb70bd0ce20e99e323eea92e2c67bcfb7e3ff01100cb44b34d4b6c281.exe 27 PID 1340 wrote to memory of 428 1340 edc5938cb70bd0ce20e99e323eea92e2c67bcfb7e3ff01100cb44b34d4b6c281.exe 27 PID 1340 wrote to memory of 428 1340 edc5938cb70bd0ce20e99e323eea92e2c67bcfb7e3ff01100cb44b34d4b6c281.exe 27 PID 1340 wrote to memory of 428 1340 edc5938cb70bd0ce20e99e323eea92e2c67bcfb7e3ff01100cb44b34d4b6c281.exe 27 PID 1340 wrote to memory of 428 1340 edc5938cb70bd0ce20e99e323eea92e2c67bcfb7e3ff01100cb44b34d4b6c281.exe 27 PID 1340 wrote to memory of 428 1340 edc5938cb70bd0ce20e99e323eea92e2c67bcfb7e3ff01100cb44b34d4b6c281.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\edc5938cb70bd0ce20e99e323eea92e2c67bcfb7e3ff01100cb44b34d4b6c281.exe"C:\Users\Admin\AppData\Local\Temp\edc5938cb70bd0ce20e99e323eea92e2c67bcfb7e3ff01100cb44b34d4b6c281.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:428
-