Analysis
-
max time kernel
149s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 17:59
Behavioral task
behavioral1
Sample
aa50601fb7f0ade8ccde50547421ac7876ebf61d46fda5c03dcd8ae3bfdb886b.exe
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
aa50601fb7f0ade8ccde50547421ac7876ebf61d46fda5c03dcd8ae3bfdb886b.exe
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
aa50601fb7f0ade8ccde50547421ac7876ebf61d46fda5c03dcd8ae3bfdb886b.exe
-
Size
165KB
-
MD5
0b7cf10a9e713cc134257923a9b48dbe
-
SHA1
35ac5f7f7a3b279ff8df823d8c4646fe887a2e09
-
SHA256
aa50601fb7f0ade8ccde50547421ac7876ebf61d46fda5c03dcd8ae3bfdb886b
-
SHA512
3d217d8904c38645a416390344165ce260f41bfd0b4f0c86e553add54070cfc0e543e8cdbb1772d218f411af2d62b1a4549207f3994d0d0aac5284dae09e24ac
-
SSDEEP
1536:tCFjZHdOUPPiCWZz+i8Duyc92nJamTfLn0RJp6/uzPbAuR8J:wFpwUniCWMid92nJamTb0Emj8
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/548-132-0x0000000000400000-0x000000000043E000-memory.dmp upx -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 548 aa50601fb7f0ade8ccde50547421ac7876ebf61d46fda5c03dcd8ae3bfdb886b.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 548 wrote to memory of 1272 548 aa50601fb7f0ade8ccde50547421ac7876ebf61d46fda5c03dcd8ae3bfdb886b.exe 20 PID 548 wrote to memory of 1272 548 aa50601fb7f0ade8ccde50547421ac7876ebf61d46fda5c03dcd8ae3bfdb886b.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\aa50601fb7f0ade8ccde50547421ac7876ebf61d46fda5c03dcd8ae3bfdb886b.exe"C:\Users\Admin\AppData\Local\Temp\aa50601fb7f0ade8ccde50547421ac7876ebf61d46fda5c03dcd8ae3bfdb886b.exe"2⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:548
-