Analysis
-
max time kernel
129s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-05-2023 01:01
Behavioral task
behavioral1
Sample
644e22017e7ea1528dca300ff5efc8a07f8587b3b15ea079ea0b9b205b0b4d83.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
General
-
Target
644e22017e7ea1528dca300ff5efc8a07f8587b3b15ea079ea0b9b205b0b4d83.exe
-
Size
431KB
-
MD5
0ec8c3c2398d384e8f53ce811a488b49
-
SHA1
6de36a097b8d734bf242a22efb0f64fc433b87cb
-
SHA256
644e22017e7ea1528dca300ff5efc8a07f8587b3b15ea079ea0b9b205b0b4d83
-
SHA512
f100b7b7e5306be27f084c1347a285998b5bba1d8872167e3632797a6d6c0f94803152f56be29ee89a3a9f74da0dc5f984d14eccfd9eeb7804051a5e4999589b
-
SSDEEP
6144:GvuswBr11L2Ji69aOZjYqnKhTuo7Ebr9bH30+lDPt:GvuxnOo4brxH30iDPt
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 108 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1072 wrote to memory of 108 1072 644e22017e7ea1528dca300ff5efc8a07f8587b3b15ea079ea0b9b205b0b4d83.exe 28 PID 1072 wrote to memory of 108 1072 644e22017e7ea1528dca300ff5efc8a07f8587b3b15ea079ea0b9b205b0b4d83.exe 28 PID 1072 wrote to memory of 108 1072 644e22017e7ea1528dca300ff5efc8a07f8587b3b15ea079ea0b9b205b0b4d83.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\644e22017e7ea1528dca300ff5efc8a07f8587b3b15ea079ea0b9b205b0b4d83.exe"C:\Users\Admin\AppData\Local\Temp\644e22017e7ea1528dca300ff5efc8a07f8587b3b15ea079ea0b9b205b0b4d83.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 4962⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:108
-