Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 07:07
Static task
static1
Behavioral task
behavioral1
Sample
bf7281972baa4d27494d35507609eacefc9365a4211ac51484a12553b8ba043e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bf7281972baa4d27494d35507609eacefc9365a4211ac51484a12553b8ba043e.exe
Resource
win10v2004-20221111-en
General
-
Target
bf7281972baa4d27494d35507609eacefc9365a4211ac51484a12553b8ba043e.exe
-
Size
2.6MB
-
MD5
b316a2da862ef539626bfe64a30d723b
-
SHA1
5b5995e0a536f32dd25f2c9aabbb544772620247
-
SHA256
bf7281972baa4d27494d35507609eacefc9365a4211ac51484a12553b8ba043e
-
SHA512
2685437f945a1bf42114c5e97643e41513c555956072d2c1b9940bb1a5292cae81a445b5e73ef4575a4b9193a6a1f56fe8da9950590cde01eecf5e731f046459
-
SSDEEP
49152:iK+jszfM+lrD2eFqfC90vYFOj28lQmtxbyaPWkj:iK+jszx1D2SqfxBN32abj
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1464 bf7281972baa4d27494d35507609eacefc9365a4211ac51484a12553b8ba043e.exe 1464 bf7281972baa4d27494d35507609eacefc9365a4211ac51484a12553b8ba043e.exe 1464 bf7281972baa4d27494d35507609eacefc9365a4211ac51484a12553b8ba043e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1392 1464 bf7281972baa4d27494d35507609eacefc9365a4211ac51484a12553b8ba043e.exe 17 PID 1464 wrote to memory of 1392 1464 bf7281972baa4d27494d35507609eacefc9365a4211ac51484a12553b8ba043e.exe 17 PID 1464 wrote to memory of 1392 1464 bf7281972baa4d27494d35507609eacefc9365a4211ac51484a12553b8ba043e.exe 17 PID 1464 wrote to memory of 1392 1464 bf7281972baa4d27494d35507609eacefc9365a4211ac51484a12553b8ba043e.exe 17 PID 1464 wrote to memory of 1392 1464 bf7281972baa4d27494d35507609eacefc9365a4211ac51484a12553b8ba043e.exe 17 PID 1464 wrote to memory of 1392 1464 bf7281972baa4d27494d35507609eacefc9365a4211ac51484a12553b8ba043e.exe 17
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\bf7281972baa4d27494d35507609eacefc9365a4211ac51484a12553b8ba043e.exe"C:\Users\Admin\AppData\Local\Temp\bf7281972baa4d27494d35507609eacefc9365a4211ac51484a12553b8ba043e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1464
-