Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2022 02:07
Static task
static1
Behavioral task
behavioral1
Sample
a12e4d5df45219e4beeacdcae8f5e8137390850263a030873310110d2f8179c3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a12e4d5df45219e4beeacdcae8f5e8137390850263a030873310110d2f8179c3.exe
Resource
win10v2004-20221111-en
General
-
Target
a12e4d5df45219e4beeacdcae8f5e8137390850263a030873310110d2f8179c3.exe
-
Size
522KB
-
MD5
eb93941f41e06839d13dbb4e6b016805
-
SHA1
ae03aafe3b25b3a6d3dda1a720b16de8bd6c7569
-
SHA256
a12e4d5df45219e4beeacdcae8f5e8137390850263a030873310110d2f8179c3
-
SHA512
5fc137472b39def106815edac6280410413285d03fad905e173ada90327a8a084ccba8bef26a6ba158a31912f411a0d9b710e014de2a0e88e1a91c5c0a927e91
-
SSDEEP
6144:ArX06exPbFLmMv3ohUNbVyTK64qxcZUfGivyQxI2amQy1CrxQqD9RSaSz+8O5R7E:0yZ1FohUVqKJqVvyLby18xQqpx8O5R
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2072 wrote to memory of 4952 2072 a12e4d5df45219e4beeacdcae8f5e8137390850263a030873310110d2f8179c3.exe 83 PID 2072 wrote to memory of 4952 2072 a12e4d5df45219e4beeacdcae8f5e8137390850263a030873310110d2f8179c3.exe 83 PID 2072 wrote to memory of 4952 2072 a12e4d5df45219e4beeacdcae8f5e8137390850263a030873310110d2f8179c3.exe 83 PID 2072 wrote to memory of 3484 2072 a12e4d5df45219e4beeacdcae8f5e8137390850263a030873310110d2f8179c3.exe 84 PID 2072 wrote to memory of 3484 2072 a12e4d5df45219e4beeacdcae8f5e8137390850263a030873310110d2f8179c3.exe 84 PID 2072 wrote to memory of 3484 2072 a12e4d5df45219e4beeacdcae8f5e8137390850263a030873310110d2f8179c3.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a12e4d5df45219e4beeacdcae8f5e8137390850263a030873310110d2f8179c3.exe"C:\Users\Admin\AppData\Local\Temp\a12e4d5df45219e4beeacdcae8f5e8137390850263a030873310110d2f8179c3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\a12e4d5df45219e4beeacdcae8f5e8137390850263a030873310110d2f8179c3.exestart2⤵PID:4952
-
-
C:\Users\Admin\AppData\Local\Temp\a12e4d5df45219e4beeacdcae8f5e8137390850263a030873310110d2f8179c3.exewatch2⤵PID:3484
-