Analysis
-
max time kernel
141s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 05:18
Static task
static1
Behavioral task
behavioral1
Sample
ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe
Resource
win10v2004-20220812-en
General
-
Target
ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe
-
Size
310KB
-
MD5
4d6836342d59ca4112c4eb4e1f14b9d0
-
SHA1
4e34682c2bce0b5f7969bf13547610204b970b3b
-
SHA256
ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674
-
SHA512
d661df6b98c3d640a34399a45ff14301828a8adc111f4db5c764aa3b1d0e1dc48f435862813b89aeeb69c86b9fb9ec335779179bce97061961dca9fbbcbaa45c
-
SSDEEP
6144:S1cZ0mzA+m5H32rr83YWGzDSHj9T6DRHvGhoiNtXoWm1mrsj9bKZlIW:S3ZVOr8FuKj9OlvGhDNtYWDS9+ZlI
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4748 wrote to memory of 4160 4748 ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe 80 PID 4748 wrote to memory of 4160 4748 ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe 80 PID 4748 wrote to memory of 4160 4748 ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe"C:\Users\Admin\AppData\Local\Temp\ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\ef1ec8d81f0188b052614609004f1fee720d22eef51ed922af48f527e42f8674.exetear2⤵PID:4160
-