Analysis
-
max time kernel
21s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
4ef702a13b87f44dcdc149ba50fc0a334192c57018ccc1d846d19d8c4646fc93.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4ef702a13b87f44dcdc149ba50fc0a334192c57018ccc1d846d19d8c4646fc93.exe
Resource
win10v2004-20240802-en
General
-
Target
4ef702a13b87f44dcdc149ba50fc0a334192c57018ccc1d846d19d8c4646fc93.exe
-
Size
239KB
-
MD5
58a5c8b03f4f14c3fdfeb1e73cf72ac8
-
SHA1
fd35c9c55012cc6871812cc985dbdb436ccb0fac
-
SHA256
4ef702a13b87f44dcdc149ba50fc0a334192c57018ccc1d846d19d8c4646fc93
-
SHA512
3e18a44e6c113d8f7c975bae6b57137524c15ebe802462c8be8da94b917341fdb4654aa51d9f5846978e827ace1ed521b1da6a33f1200c203e4ac1f9e4cec639
-
SSDEEP
3072:hsXRmUIMitiMQose27vc+Eld+xZp2vPRL1tT06zJoxAWBcKpSP//dwR1l9B4hT5:GR5IuMQoseGk7RZBGxAycKpSPX2pU3
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2308 2932 4ef702a13b87f44dcdc149ba50fc0a334192c57018ccc1d846d19d8c4646fc93.exe 30 PID 2932 wrote to memory of 2308 2932 4ef702a13b87f44dcdc149ba50fc0a334192c57018ccc1d846d19d8c4646fc93.exe 30 PID 2932 wrote to memory of 2308 2932 4ef702a13b87f44dcdc149ba50fc0a334192c57018ccc1d846d19d8c4646fc93.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ef702a13b87f44dcdc149ba50fc0a334192c57018ccc1d846d19d8c4646fc93.exe"C:\Users\Admin\AppData\Local\Temp\4ef702a13b87f44dcdc149ba50fc0a334192c57018ccc1d846d19d8c4646fc93.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 4562⤵PID:2308
-