Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 19:47
Static task
static1
Behavioral task
behavioral1
Sample
6c0d5a5feca34694a72418503ea630574e5aac495dce8e10659d651b6d6c9153.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6c0d5a5feca34694a72418503ea630574e5aac495dce8e10659d651b6d6c9153.exe
Resource
win10v2004-20220812-en
General
-
Target
6c0d5a5feca34694a72418503ea630574e5aac495dce8e10659d651b6d6c9153.exe
-
Size
676KB
-
MD5
0eae16bfc075337fee86d898ecd4c365
-
SHA1
3132d086d57d5d7d6815f872db5dd63f9d4ab133
-
SHA256
6c0d5a5feca34694a72418503ea630574e5aac495dce8e10659d651b6d6c9153
-
SHA512
610345b18ccb6241195e037b36564154ae49f07f3cc49347bb7d76e3156dea3455eeae3594bc93009ad737277678ccb70ce2e3398aa9f9d2fb4f20cc654a86f8
-
SSDEEP
12288:iGsDviZA7tqzPOzEU1dyZdrgAI1w5BmwQs8Qjgb0LeN7NAx+CuwzblGgpke:QDxymzH1idrpIMBhgb0LeN7ex+0wgpj
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5040 wrote to memory of 4980 5040 6c0d5a5feca34694a72418503ea630574e5aac495dce8e10659d651b6d6c9153.exe 83 PID 5040 wrote to memory of 4980 5040 6c0d5a5feca34694a72418503ea630574e5aac495dce8e10659d651b6d6c9153.exe 83 PID 5040 wrote to memory of 4980 5040 6c0d5a5feca34694a72418503ea630574e5aac495dce8e10659d651b6d6c9153.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c0d5a5feca34694a72418503ea630574e5aac495dce8e10659d651b6d6c9153.exe"C:\Users\Admin\AppData\Local\Temp\6c0d5a5feca34694a72418503ea630574e5aac495dce8e10659d651b6d6c9153.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4980
-