Analysis
-
max time kernel
42s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 23:02
Static task
static1
Behavioral task
behavioral1
Sample
6c30439935ad789336319afec940d5aebab580759a0570daa2747ef2377dac75.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6c30439935ad789336319afec940d5aebab580759a0570daa2747ef2377dac75.exe
Resource
win10v2004-20221111-en
General
-
Target
6c30439935ad789336319afec940d5aebab580759a0570daa2747ef2377dac75.exe
-
Size
2.6MB
-
MD5
6296a99455288ba4d9d094a17802f4ee
-
SHA1
d6b8af4d9b1e2c3331d9189b665364bad930283f
-
SHA256
6c30439935ad789336319afec940d5aebab580759a0570daa2747ef2377dac75
-
SHA512
58ede465d378207ff89673afe3a35d9d0b728834d2bbcaf91f21b87505a79880c5aad3ced7d7ed9f6a2124fd2cfc31ec4fe8aad26b2cabf74fe7e42e0e68819d
-
SSDEEP
49152:DCkQ9T0RFnqx7M3xN5bwB4ZHax8eB7q2wj95yF/zuB+kkK1ss9GkiLefFr4CkbDC:DZQ9QaxwH9wB4RcZGR9g/zuBRsseLedd
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1284 1720 6c30439935ad789336319afec940d5aebab580759a0570daa2747ef2377dac75.exe 27 PID 1720 wrote to memory of 1284 1720 6c30439935ad789336319afec940d5aebab580759a0570daa2747ef2377dac75.exe 27 PID 1720 wrote to memory of 1284 1720 6c30439935ad789336319afec940d5aebab580759a0570daa2747ef2377dac75.exe 27 PID 1720 wrote to memory of 1284 1720 6c30439935ad789336319afec940d5aebab580759a0570daa2747ef2377dac75.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c30439935ad789336319afec940d5aebab580759a0570daa2747ef2377dac75.exe"C:\Users\Admin\AppData\Local\Temp\6c30439935ad789336319afec940d5aebab580759a0570daa2747ef2377dac75.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\6c30439935ad789336319afec940d5aebab580759a0570daa2747ef2377dac75.exe6c30439935ad789336319afec940d5aebab580759a0570daa2747ef2377dac75.exe2⤵PID:1284
-