Analysis
-
max time kernel
94s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 10:42
Static task
static1
Behavioral task
behavioral1
Sample
37e4ca0b5ac642c0ee68f816d7fafaab2b6f912b0ea673749d2e347f03dc2743.exe
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
37e4ca0b5ac642c0ee68f816d7fafaab2b6f912b0ea673749d2e347f03dc2743.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
37e4ca0b5ac642c0ee68f816d7fafaab2b6f912b0ea673749d2e347f03dc2743.exe
-
Size
133KB
-
MD5
7b6b198ecd1c707c8cde133d41394bd4
-
SHA1
0e3cc05045b5764da681ce589a1475f8ca7db4eb
-
SHA256
37e4ca0b5ac642c0ee68f816d7fafaab2b6f912b0ea673749d2e347f03dc2743
-
SHA512
220e5fd23cd44de83264b24cfc3cb508b5de4562372576ec4cce0b0aae7e2fea93c079a74bab57fe93cbde2310979358fcab973058af82d0611cef3bf2594e5b
-
SSDEEP
3072:G1BRrbB9mjD2BGzbHI+W5/LA2N5lOMU3zPXWl/L:mBRrt9meHJ8rMUA
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/340-57-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/340-61-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/340-60-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/340-63-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1384 wrote to memory of 340 1384 37e4ca0b5ac642c0ee68f816d7fafaab2b6f912b0ea673749d2e347f03dc2743.exe 28 PID 1384 wrote to memory of 340 1384 37e4ca0b5ac642c0ee68f816d7fafaab2b6f912b0ea673749d2e347f03dc2743.exe 28 PID 1384 wrote to memory of 340 1384 37e4ca0b5ac642c0ee68f816d7fafaab2b6f912b0ea673749d2e347f03dc2743.exe 28 PID 1384 wrote to memory of 340 1384 37e4ca0b5ac642c0ee68f816d7fafaab2b6f912b0ea673749d2e347f03dc2743.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\37e4ca0b5ac642c0ee68f816d7fafaab2b6f912b0ea673749d2e347f03dc2743.exe"C:\Users\Admin\AppData\Local\Temp\37e4ca0b5ac642c0ee68f816d7fafaab2b6f912b0ea673749d2e347f03dc2743.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\37e4ca0b5ac642c0ee68f816d7fafaab2b6f912b0ea673749d2e347f03dc2743.exe?2⤵PID:340
-