Analysis
-
max time kernel
39s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
c70e26b24520ec8b8693091b3b1d52c9769b3c00e0d35f2b6fe843761f729511.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c70e26b24520ec8b8693091b3b1d52c9769b3c00e0d35f2b6fe843761f729511.exe
Resource
win10v2004-20220812-en
General
-
Target
c70e26b24520ec8b8693091b3b1d52c9769b3c00e0d35f2b6fe843761f729511.exe
-
Size
168KB
-
MD5
6a8fc63ed3bbfb383680e501ac94bf67
-
SHA1
de5996fb48db862b374ac463cc5ea1596b0757ac
-
SHA256
c70e26b24520ec8b8693091b3b1d52c9769b3c00e0d35f2b6fe843761f729511
-
SHA512
6c3b681083c73e1d7e3155a448bd1ae7e54df3779782f6faa6fb9cd80015fd6c887c88f3a9cc90787f611cefdc1c4204e37d4ef05209302070a8478c78dba165
-
SSDEEP
3072:ZoDAJHwGMzuNwv7z0QJ/xfd0AApEvFJG3I/oWXwrONWnaUW7eavJr9ijk8HnsLgY:dJHdMaNi3fd6if/Pw8UW6avJrEhnEgY
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1280 c70e26b24520ec8b8693091b3b1d52c9769b3c00e0d35f2b6fe843761f729511.exe 1280 c70e26b24520ec8b8693091b3b1d52c9769b3c00e0d35f2b6fe843761f729511.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1280 wrote to memory of 1372 1280 c70e26b24520ec8b8693091b3b1d52c9769b3c00e0d35f2b6fe843761f729511.exe 10 PID 1280 wrote to memory of 1372 1280 c70e26b24520ec8b8693091b3b1d52c9769b3c00e0d35f2b6fe843761f729511.exe 10 PID 1280 wrote to memory of 1372 1280 c70e26b24520ec8b8693091b3b1d52c9769b3c00e0d35f2b6fe843761f729511.exe 10 PID 1280 wrote to memory of 1372 1280 c70e26b24520ec8b8693091b3b1d52c9769b3c00e0d35f2b6fe843761f729511.exe 10
Processes
-
C:\Users\Admin\AppData\Local\Temp\c70e26b24520ec8b8693091b3b1d52c9769b3c00e0d35f2b6fe843761f729511.exe"C:\Users\Admin\AppData\Local\Temp\c70e26b24520ec8b8693091b3b1d52c9769b3c00e0d35f2b6fe843761f729511.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1280
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372