Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 16:55
Static task
static1
Behavioral task
behavioral1
Sample
22b70a95a55d8fef3f91dafe9b8c2d8df35e8d893888515fcd80c4e5f864e233.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
22b70a95a55d8fef3f91dafe9b8c2d8df35e8d893888515fcd80c4e5f864e233.exe
Resource
win10v2004-20220812-en
General
-
Target
22b70a95a55d8fef3f91dafe9b8c2d8df35e8d893888515fcd80c4e5f864e233.exe
-
Size
293KB
-
MD5
9172a5b6b47819b84e746977154df170
-
SHA1
0a95758dd1e400cbe072558451af96d273d471df
-
SHA256
22b70a95a55d8fef3f91dafe9b8c2d8df35e8d893888515fcd80c4e5f864e233
-
SHA512
773a0521b2a3d0268704efb0223508f673ad42e2701b0c82ed5f96f93dccb6cb5291e555fc3148c65df1c7a4552117b009f0a5afb1c35758fe53bbd9cfb080f8
-
SSDEEP
6144:75RWesTdXA79Jw9qvOpoFfjZtzQR1vvaLbIedww2v9NFHLrIwl4k21h:90esTK796YOpo9De1viIed+JHTlXG
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3156 wrote to memory of 4264 3156 22b70a95a55d8fef3f91dafe9b8c2d8df35e8d893888515fcd80c4e5f864e233.exe 86 PID 3156 wrote to memory of 4264 3156 22b70a95a55d8fef3f91dafe9b8c2d8df35e8d893888515fcd80c4e5f864e233.exe 86 PID 3156 wrote to memory of 4264 3156 22b70a95a55d8fef3f91dafe9b8c2d8df35e8d893888515fcd80c4e5f864e233.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\22b70a95a55d8fef3f91dafe9b8c2d8df35e8d893888515fcd80c4e5f864e233.exe"C:\Users\Admin\AppData\Local\Temp\22b70a95a55d8fef3f91dafe9b8c2d8df35e8d893888515fcd80c4e5f864e233.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\22b70a95a55d8fef3f91dafe9b8c2d8df35e8d893888515fcd80c4e5f864e233.exetear2⤵PID:4264
-