Analysis
-
max time kernel
36s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 04:06
Static task
static1
Behavioral task
behavioral1
Sample
bb22658ee260ea018250137b4f66f6d55c86552cc3fcb610da134e2cbaacf891.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bb22658ee260ea018250137b4f66f6d55c86552cc3fcb610da134e2cbaacf891.exe
Resource
win10v2004-20220812-en
General
-
Target
bb22658ee260ea018250137b4f66f6d55c86552cc3fcb610da134e2cbaacf891.exe
-
Size
7KB
-
MD5
cff9e9d85e5df8fec300853a24afc223
-
SHA1
6a42f3d88b0290c237ca67716556b7dc34ce9c4b
-
SHA256
bb22658ee260ea018250137b4f66f6d55c86552cc3fcb610da134e2cbaacf891
-
SHA512
31bba0b93ba68d857b0fb96f456b686040c45f3683c576446ef5740e4539feab1a8c6d55f72e177a46de7279dfd37473123387d7263a8e02da61272260b81729
-
SSDEEP
96:tmu+RJLTe6ZAaYqmr1yueQYnHM6hRyGfNp4v8lCrGhicgYryFL:J+fLTeEAaYzr1yps6FOv8lCrG8BYG9
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1392 wrote to memory of 616 1392 bb22658ee260ea018250137b4f66f6d55c86552cc3fcb610da134e2cbaacf891.exe 28 PID 1392 wrote to memory of 616 1392 bb22658ee260ea018250137b4f66f6d55c86552cc3fcb610da134e2cbaacf891.exe 28 PID 1392 wrote to memory of 616 1392 bb22658ee260ea018250137b4f66f6d55c86552cc3fcb610da134e2cbaacf891.exe 28 PID 1392 wrote to memory of 616 1392 bb22658ee260ea018250137b4f66f6d55c86552cc3fcb610da134e2cbaacf891.exe 28 PID 1392 wrote to memory of 616 1392 bb22658ee260ea018250137b4f66f6d55c86552cc3fcb610da134e2cbaacf891.exe 28 PID 1392 wrote to memory of 616 1392 bb22658ee260ea018250137b4f66f6d55c86552cc3fcb610da134e2cbaacf891.exe 28 PID 1392 wrote to memory of 616 1392 bb22658ee260ea018250137b4f66f6d55c86552cc3fcb610da134e2cbaacf891.exe 28 PID 1392 wrote to memory of 616 1392 bb22658ee260ea018250137b4f66f6d55c86552cc3fcb610da134e2cbaacf891.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb22658ee260ea018250137b4f66f6d55c86552cc3fcb610da134e2cbaacf891.exe"C:\Users\Admin\AppData\Local\Temp\bb22658ee260ea018250137b4f66f6d55c86552cc3fcb610da134e2cbaacf891.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:616
-