Analysis
-
max time kernel
127s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exe
Resource
win10v2004-20221111-en
General
-
Target
fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exe
-
Size
522KB
-
MD5
d416bd48b546afc16b79ab4362f35831
-
SHA1
e4bb7e6f4b1ebb141b0a45c9b4a9bd4cc263baf6
-
SHA256
fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c
-
SHA512
17ea64a699388dcfaba5be58da14bc972514a2b45bf3a375925c617530a3d14ae0a59803e4315e75cb4771fc608cb3e5f045b20035a3d5fc7e585e9012425e37
-
SSDEEP
6144:SDuwNWG/hqSEWSipzuIs9AjBw9bX3asWXhddNbRGODYYaBAmQy1CrxQqD9RSaSzG:34EC8VxsXbsW9ny18xQqpx8O5VuF
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4952 wrote to memory of 4628 4952 fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exe 81 PID 4952 wrote to memory of 4628 4952 fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exe 81 PID 4952 wrote to memory of 4628 4952 fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exe 81 PID 4952 wrote to memory of 4636 4952 fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exe 82 PID 4952 wrote to memory of 4636 4952 fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exe 82 PID 4952 wrote to memory of 4636 4952 fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exe"C:\Users\Admin\AppData\Local\Temp\fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exestart2⤵PID:4628
-
-
C:\Users\Admin\AppData\Local\Temp\fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exewatch2⤵PID:4636
-