Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22/07/2023, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
8e40b48d06466da3b63341dc62dd0403c57fc2f017317d842ea86d601dde38e5.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8e40b48d06466da3b63341dc62dd0403c57fc2f017317d842ea86d601dde38e5.exe
Resource
win10v2004-20230703-en
General
-
Target
8e40b48d06466da3b63341dc62dd0403c57fc2f017317d842ea86d601dde38e5.exe
-
Size
42KB
-
MD5
80cc187a15b6b6340385922631bad640
-
SHA1
a74ca1c69f69388c358f36fb44dcccfa057d792d
-
SHA256
8e40b48d06466da3b63341dc62dd0403c57fc2f017317d842ea86d601dde38e5
-
SHA512
be1adc451bfcce70f865e82525fbd674a7efae3f59cfcdcb6436abf6cf5586fc3e452d228aeed938eb4ec2850ffb95f3b341129b839486bb57611c98417980c6
-
SSDEEP
384:0jXpuEDKOlrP95I4GS1dQhNz7YrgAlBCxIgVbPeuaBU3losjuzZ6UwYRGZqm7aLm:MuEDlV70HA6zPP3lLuzZPKq9WvlnZxb
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2528 1700 8e40b48d06466da3b63341dc62dd0403c57fc2f017317d842ea86d601dde38e5.exe 29 PID 1700 wrote to memory of 2528 1700 8e40b48d06466da3b63341dc62dd0403c57fc2f017317d842ea86d601dde38e5.exe 29 PID 1700 wrote to memory of 2528 1700 8e40b48d06466da3b63341dc62dd0403c57fc2f017317d842ea86d601dde38e5.exe 29 PID 1700 wrote to memory of 2528 1700 8e40b48d06466da3b63341dc62dd0403c57fc2f017317d842ea86d601dde38e5.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e40b48d06466da3b63341dc62dd0403c57fc2f017317d842ea86d601dde38e5.exe"C:\Users\Admin\AppData\Local\Temp\8e40b48d06466da3b63341dc62dd0403c57fc2f017317d842ea86d601dde38e5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\cmd.execmd.exe2⤵PID:2528
-