Analysis
-
max time kernel
138s -
max time network
141s -
resource
win7v191014
Task
task1
Sample
4521b808bdef66ad187a6aed96eb2a853d60e758884b66aedf031cddf21a1fb4.exe
Resource
win7v191014
0 signatures
Task
task2
Sample
4521b808bdef66ad187a6aed96eb2a853d60e758884b66aedf031cddf21a1fb4.exe
Resource
win10v191014
0 signatures
General
-
Target
4521b808bdef66ad187a6aed96eb2a853d60e758884b66aedf031cddf21a1fb4
-
Sample
191025-747am3jafs
-
SHA256
4521b808bdef66ad187a6aed96eb2a853d60e758884b66aedf031cddf21a1fb4
Score
N/A
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1992 1492 4521b808bdef66ad187a6aed96eb2a853d60e758884b66aedf031cddf21a1fb4.exe 27 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1492 set thread context of 1992 1492 4521b808bdef66ad187a6aed96eb2a853d60e758884b66aedf031cddf21a1fb4.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\4521b808bdef66ad187a6aed96eb2a853d60e758884b66aedf031cddf21a1fb4.exe"C:\Users\Admin\AppData\Local\Temp\4521b808bdef66ad187a6aed96eb2a853d60e758884b66aedf031cddf21a1fb4.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1492
-
C:\Users\Admin\AppData\Local\Temp\4521b808bdef66ad187a6aed96eb2a853d60e758884b66aedf031cddf21a1fb4.exe"C:\Users\Admin\AppData\Local\Temp\4521b808bdef66ad187a6aed96eb2a853d60e758884b66aedf031cddf21a1fb4.exe"1⤵PID:1992