Analysis
-
max time kernel
161s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exe
Resource
win10v2004-20221111-en
General
-
Target
c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exe
-
Size
522KB
-
MD5
4bc50d57ef7046ed6b70ca1cca3bce9a
-
SHA1
d9a0af13b93eae7cc09c863296139d15b5f9b456
-
SHA256
c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de
-
SHA512
b90a6915d50321467852c4e7662871c4e841527b393fb0eec62470214eab3840b8d6338654ef6557cf313bb81615ebe6bb5ba2e2b81e6cc7cf19972c19e6eece
-
SSDEEP
6144:r6H2Cm4thb9C6QfKOZIJWAwCoYhEL8XlbFIszwU2rFPAJmQy1CrxQqD9RSaSz+8d:Em4thb7QVXPb8Vd66y18xQqpx8O5q
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2784 2580 c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exe 83 PID 2580 wrote to memory of 2784 2580 c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exe 83 PID 2580 wrote to memory of 2784 2580 c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exe 83 PID 2580 wrote to memory of 1240 2580 c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exe 84 PID 2580 wrote to memory of 1240 2580 c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exe 84 PID 2580 wrote to memory of 1240 2580 c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exe"C:\Users\Admin\AppData\Local\Temp\c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exestart2⤵PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exewatch2⤵PID:1240
-