Analysis
-
max time kernel
190s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 03:25
Static task
static1
Behavioral task
behavioral1
Sample
69cc6c8d9aa0fe3986f154c2885f312a0f6b3791a2f6d5954564b58d7b3fce22.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
69cc6c8d9aa0fe3986f154c2885f312a0f6b3791a2f6d5954564b58d7b3fce22.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
69cc6c8d9aa0fe3986f154c2885f312a0f6b3791a2f6d5954564b58d7b3fce22.exe
-
Size
31KB
-
MD5
2e41ca875a331a76784960a554d7a6c5
-
SHA1
f1c3d8803b7bbc8ad1ecb81fea05639353ae0a3b
-
SHA256
69cc6c8d9aa0fe3986f154c2885f312a0f6b3791a2f6d5954564b58d7b3fce22
-
SHA512
e30950b4ca6d14b97724c4aa5ba8e185f0b62436580a5bb629b2726d984d87965974f33100dfcb0e70a97240f4ab457a1d93d693f5fa679609b2f02435354918
-
SSDEEP
768:Z+h7TzTBziifTeiZSVWihwEknh0L7OTLeNfQff:kZ/nEkh8OTKNe
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4480 69cc6c8d9aa0fe3986f154c2885f312a0f6b3791a2f6d5954564b58d7b3fce22.exe 4480 69cc6c8d9aa0fe3986f154c2885f312a0f6b3791a2f6d5954564b58d7b3fce22.exe 4480 69cc6c8d9aa0fe3986f154c2885f312a0f6b3791a2f6d5954564b58d7b3fce22.exe 4480 69cc6c8d9aa0fe3986f154c2885f312a0f6b3791a2f6d5954564b58d7b3fce22.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4480 wrote to memory of 676 4480 69cc6c8d9aa0fe3986f154c2885f312a0f6b3791a2f6d5954564b58d7b3fce22.exe 41 PID 4480 wrote to memory of 676 4480 69cc6c8d9aa0fe3986f154c2885f312a0f6b3791a2f6d5954564b58d7b3fce22.exe 41 PID 4480 wrote to memory of 676 4480 69cc6c8d9aa0fe3986f154c2885f312a0f6b3791a2f6d5954564b58d7b3fce22.exe 41 PID 4480 wrote to memory of 676 4480 69cc6c8d9aa0fe3986f154c2885f312a0f6b3791a2f6d5954564b58d7b3fce22.exe 41
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\69cc6c8d9aa0fe3986f154c2885f312a0f6b3791a2f6d5954564b58d7b3fce22.exe"C:\Users\Admin\AppData\Local\Temp\69cc6c8d9aa0fe3986f154c2885f312a0f6b3791a2f6d5954564b58d7b3fce22.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4480
-