Analysis
-
max time kernel
202s -
max time network
215s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
9f8f05209c401ece65372d992e30feef5c0117ed4ff19990f11f7f8f037c2a60.exe
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
9f8f05209c401ece65372d992e30feef5c0117ed4ff19990f11f7f8f037c2a60.exe
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
9f8f05209c401ece65372d992e30feef5c0117ed4ff19990f11f7f8f037c2a60.exe
-
Size
522KB
-
MD5
a56001463fff0897a262fb04f19a830f
-
SHA1
cc1a5ae4cd49b8f52e081d28f1bb4603e79e29aa
-
SHA256
9f8f05209c401ece65372d992e30feef5c0117ed4ff19990f11f7f8f037c2a60
-
SHA512
f0b40dfb9db01e6ccb182bdb36f44c208d203bdb4ea5bed0ab137d0cf1a492aefea9ae293358884f7f6a9ab7467d5b8c517406a16011dc05fea10dd6b9a91a7c
-
SSDEEP
12288:obdxMo+tiKwCt0q35y18xQqpx8O5K0J6C:obd4ifq35atqpx82J
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 520 wrote to memory of 4404 520 9f8f05209c401ece65372d992e30feef5c0117ed4ff19990f11f7f8f037c2a60.exe 82 PID 520 wrote to memory of 4404 520 9f8f05209c401ece65372d992e30feef5c0117ed4ff19990f11f7f8f037c2a60.exe 82 PID 520 wrote to memory of 4404 520 9f8f05209c401ece65372d992e30feef5c0117ed4ff19990f11f7f8f037c2a60.exe 82 PID 520 wrote to memory of 3216 520 9f8f05209c401ece65372d992e30feef5c0117ed4ff19990f11f7f8f037c2a60.exe 83 PID 520 wrote to memory of 3216 520 9f8f05209c401ece65372d992e30feef5c0117ed4ff19990f11f7f8f037c2a60.exe 83 PID 520 wrote to memory of 3216 520 9f8f05209c401ece65372d992e30feef5c0117ed4ff19990f11f7f8f037c2a60.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f8f05209c401ece65372d992e30feef5c0117ed4ff19990f11f7f8f037c2a60.exe"C:\Users\Admin\AppData\Local\Temp\9f8f05209c401ece65372d992e30feef5c0117ed4ff19990f11f7f8f037c2a60.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\9f8f05209c401ece65372d992e30feef5c0117ed4ff19990f11f7f8f037c2a60.exestart2⤵PID:4404
-
-
C:\Users\Admin\AppData\Local\Temp\9f8f05209c401ece65372d992e30feef5c0117ed4ff19990f11f7f8f037c2a60.exewatch2⤵PID:3216
-