Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-09-2023 07:35
Static task
static1
Behavioral task
behavioral1
Sample
12edd931cd3fbe67b191a719e534648aec3eee6e8b7eb9e3f0b4f1a496d1f56b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
12edd931cd3fbe67b191a719e534648aec3eee6e8b7eb9e3f0b4f1a496d1f56b.exe
Resource
win10v2004-20230831-en
General
-
Target
12edd931cd3fbe67b191a719e534648aec3eee6e8b7eb9e3f0b4f1a496d1f56b.exe
-
Size
1.8MB
-
MD5
2ba997773bbbdd84ff832d2a6f4739de
-
SHA1
c065cb9fdeffd757b63ecd60d561f2a0d07618b3
-
SHA256
12edd931cd3fbe67b191a719e534648aec3eee6e8b7eb9e3f0b4f1a496d1f56b
-
SHA512
ec86adf5bfb9219f240678cc73cc4ce64ed9ead31d933ceb145d995c1ac27e85c69479b050acaf6aac3874d1997fef3a244ffe70984ab782c6a3eb68c51840d5
-
SSDEEP
24576:qKdP+WqVbUBX+C2No3h/TnuVqa+jBJd8JsU3Aot+Ec0xMkWd0MzWvR5F:TPRqVbw+C2NQTda+brd0MzWvR5F
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2860 2184 12edd931cd3fbe67b191a719e534648aec3eee6e8b7eb9e3f0b4f1a496d1f56b.exe 29 PID 2184 wrote to memory of 2860 2184 12edd931cd3fbe67b191a719e534648aec3eee6e8b7eb9e3f0b4f1a496d1f56b.exe 29 PID 2184 wrote to memory of 2860 2184 12edd931cd3fbe67b191a719e534648aec3eee6e8b7eb9e3f0b4f1a496d1f56b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\12edd931cd3fbe67b191a719e534648aec3eee6e8b7eb9e3f0b4f1a496d1f56b.exe"C:\Users\Admin\AppData\Local\Temp\12edd931cd3fbe67b191a719e534648aec3eee6e8b7eb9e3f0b4f1a496d1f56b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2860
-