Analysis
-
max time kernel
22s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf.exe
Resource
win10v2004-20240802-en
General
-
Target
b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf.exe
-
Size
239KB
-
MD5
801703cab4bc085aec4abda3595f4d40
-
SHA1
7d9db01a7825971de68c64d9cc45e46ba10c85e4
-
SHA256
b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf
-
SHA512
0be1c562dbc2ba930f56341c3f1f6f7db1f0029735cc79719fdbea84cb1afda15f62c49829a96113b0d099320b593de02d022afb0cc6d1cf782333909aaba8a3
-
SSDEEP
3072:hsXRmUIMitiMQose27vc+Eld+xZp2vPRL1tT06zJoxAWBcKpSP//dwR1l9B4hTu:GR5IuMQoseGk7RZBGxAycKpSPX2pUE
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2808 2472 b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf.exe 30 PID 2472 wrote to memory of 2808 2472 b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf.exe 30 PID 2472 wrote to memory of 2808 2472 b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf.exe"C:\Users\Admin\AppData\Local\Temp\b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 4562⤵PID:2808
-