Analysis
-
max time kernel
91s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exe
Resource
win10v2004-20220901-en
General
-
Target
ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exe
-
Size
522KB
-
MD5
5dcdc79f3a3e9c0ae40fadbde1030d86
-
SHA1
3525c5b6194052eeec3fb16412d6279d9b1a33be
-
SHA256
ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4
-
SHA512
0ea912d2cedbfda3232783abb8ce989546ec20b81cb17c7c8399f836f0010d796b7051de50c2f9387cb96c24c3b13ee422590e5a2670eee9107376a058f9d275
-
SSDEEP
6144:QGS+fj5W6FxwvFlOMWfVE7sBLHP/z7uAOGoERwyEVjCZmQy1CrxQqD9RSaSz+8Oa:rtA8xwvFlz+VFDH+4fby18xQqpx8O5Z
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5064 wrote to memory of 1700 5064 ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exe 84 PID 5064 wrote to memory of 1700 5064 ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exe 84 PID 5064 wrote to memory of 1700 5064 ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exe 84 PID 5064 wrote to memory of 1672 5064 ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exe 85 PID 5064 wrote to memory of 1672 5064 ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exe 85 PID 5064 wrote to memory of 1672 5064 ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exe"C:\Users\Admin\AppData\Local\Temp\ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exestart2⤵PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exewatch2⤵PID:1672
-