Analysis
-
max time kernel
119s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
20180e1b5b79aa513773864dcff99b25d4623959ade8dd61c84848f1c4e9cc7a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20180e1b5b79aa513773864dcff99b25d4623959ade8dd61c84848f1c4e9cc7a.exe
Resource
win10v2004-20220812-en
General
-
Target
20180e1b5b79aa513773864dcff99b25d4623959ade8dd61c84848f1c4e9cc7a.exe
-
Size
133KB
-
MD5
60e91c49aaebeba403b9846fe51b0060
-
SHA1
76a265f1f35c84ded2b119f9e64c8dbf70ee815c
-
SHA256
20180e1b5b79aa513773864dcff99b25d4623959ade8dd61c84848f1c4e9cc7a
-
SHA512
ee9614e84dc5668422b72b6cec35d9bc05e42f785f3e2c7b40e7a7a718da8527434d9da21dcdee948a41dab441945a2fdecc00c946df30b1df39ca5384134357
-
SSDEEP
3072:AV3pohuL/qbvBsifphYSoA0GbhbhiepqiUDq/K:VuT+vBjDY5A0Gbviepq/Dj
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4104-134-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4104-137-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4104-138-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4104-140-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4104-141-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4104 20180e1b5b79aa513773864dcff99b25d4623959ade8dd61c84848f1c4e9cc7a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3960 wrote to memory of 4104 3960 20180e1b5b79aa513773864dcff99b25d4623959ade8dd61c84848f1c4e9cc7a.exe 81 PID 3960 wrote to memory of 4104 3960 20180e1b5b79aa513773864dcff99b25d4623959ade8dd61c84848f1c4e9cc7a.exe 81 PID 3960 wrote to memory of 4104 3960 20180e1b5b79aa513773864dcff99b25d4623959ade8dd61c84848f1c4e9cc7a.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\20180e1b5b79aa513773864dcff99b25d4623959ade8dd61c84848f1c4e9cc7a.exe"C:\Users\Admin\AppData\Local\Temp\20180e1b5b79aa513773864dcff99b25d4623959ade8dd61c84848f1c4e9cc7a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\20180e1b5b79aa513773864dcff99b25d4623959ade8dd61c84848f1c4e9cc7a.exe?2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:4104
-