Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16-08-2023 12:47
Static task
static1
Behavioral task
behavioral1
Sample
dfad9b11a79d675010d7df374f11fb8fc5142568e1384a0067a27f1d14f01f85.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
dfad9b11a79d675010d7df374f11fb8fc5142568e1384a0067a27f1d14f01f85.exe
Resource
win10v2004-20230703-en
General
-
Target
dfad9b11a79d675010d7df374f11fb8fc5142568e1384a0067a27f1d14f01f85.exe
-
Size
47KB
-
MD5
22ea8999735e30f1f91cc08705d0a491
-
SHA1
f672bebf02203dc7c9a334ccd573a6f5523c7099
-
SHA256
dfad9b11a79d675010d7df374f11fb8fc5142568e1384a0067a27f1d14f01f85
-
SHA512
f9b333a2970d2bf834e9533d47158123649b81cf07ed11cb7ad0a1039f269ddb896245711c8424297f9983cc6a9ad1ae1e5e3522d0f0d4b0d869e4469320a33c
-
SSDEEP
384:kJhA5hz9OVmNX6VZyT/o1ar4a4tnJKQka2UQQnNvU1MQgCiRR:kAnIi6VZs/KM4tnJKraXRcsC4R
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2420 2304 dfad9b11a79d675010d7df374f11fb8fc5142568e1384a0067a27f1d14f01f85.exe 29 PID 2304 wrote to memory of 2420 2304 dfad9b11a79d675010d7df374f11fb8fc5142568e1384a0067a27f1d14f01f85.exe 29 PID 2304 wrote to memory of 2420 2304 dfad9b11a79d675010d7df374f11fb8fc5142568e1384a0067a27f1d14f01f85.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfad9b11a79d675010d7df374f11fb8fc5142568e1384a0067a27f1d14f01f85.exe"C:\Users\Admin\AppData\Local\Temp\dfad9b11a79d675010d7df374f11fb8fc5142568e1384a0067a27f1d14f01f85.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\system32\cmd.execmd.exe2⤵PID:2420
-