Analysis
-
max time kernel
47s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 09:18
Static task
static1
Behavioral task
behavioral1
Sample
8492849ac6a67fc12e5823550bfb212e8a3424dcde7337c9573b5c7c1b9bbdb2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8492849ac6a67fc12e5823550bfb212e8a3424dcde7337c9573b5c7c1b9bbdb2.exe
Resource
win10v2004-20220812-en
General
-
Target
8492849ac6a67fc12e5823550bfb212e8a3424dcde7337c9573b5c7c1b9bbdb2.exe
-
Size
58KB
-
MD5
1c4adedeab38cf69cd2158227c4b53a1
-
SHA1
63fe9fe62ae54bca5e3adcb71b93c3d09adb7d91
-
SHA256
8492849ac6a67fc12e5823550bfb212e8a3424dcde7337c9573b5c7c1b9bbdb2
-
SHA512
319f419b4d04335a030a753170ebb5dc7be024c502eb5e199b3da3542f3082560a91b0f82f5c88cdfe2fe47721e56b6fee512718fcb61f7c7c142798084f0211
-
SSDEEP
1536:/vVTskgr4n1fTT3pPPsQ2ywh6ddIvLeEh5pHQwN8s/b:ZWrG33pmQFE+s/b
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/964-59-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/964-63-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/964-62-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/964-64-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/964-66-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 964 1956 8492849ac6a67fc12e5823550bfb212e8a3424dcde7337c9573b5c7c1b9bbdb2.exe 28 PID 1956 wrote to memory of 964 1956 8492849ac6a67fc12e5823550bfb212e8a3424dcde7337c9573b5c7c1b9bbdb2.exe 28 PID 1956 wrote to memory of 964 1956 8492849ac6a67fc12e5823550bfb212e8a3424dcde7337c9573b5c7c1b9bbdb2.exe 28 PID 1956 wrote to memory of 964 1956 8492849ac6a67fc12e5823550bfb212e8a3424dcde7337c9573b5c7c1b9bbdb2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8492849ac6a67fc12e5823550bfb212e8a3424dcde7337c9573b5c7c1b9bbdb2.exe"C:\Users\Admin\AppData\Local\Temp\8492849ac6a67fc12e5823550bfb212e8a3424dcde7337c9573b5c7c1b9bbdb2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\8492849ac6a67fc12e5823550bfb212e8a3424dcde7337c9573b5c7c1b9bbdb2.exe?2⤵PID:964
-