Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
112c521f221908ec924d0b88ffc741b392d04ee5d8076d2d700e3566e42f6df8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
112c521f221908ec924d0b88ffc741b392d04ee5d8076d2d700e3566e42f6df8.exe
Resource
win10v2004-20220812-en
General
-
Target
112c521f221908ec924d0b88ffc741b392d04ee5d8076d2d700e3566e42f6df8.exe
-
Size
522KB
-
MD5
f26b670acd7a980afdc9372cec2b7071
-
SHA1
5a17c441a58e7ac376cc7aaca5551b1931074342
-
SHA256
112c521f221908ec924d0b88ffc741b392d04ee5d8076d2d700e3566e42f6df8
-
SHA512
87fd9ac6a27bbf2d300b1443edf948b1c9d74a561f049855ce1a7308ff01a3871acc11c614db65537ad223aa1a7782add9ec89ed7dc7b9f9901fa6789ddc8e82
-
SSDEEP
12288:9LGxbb+V+PCvxViJjfkJMWjsqyy18xQqpx8O5o+:4tvaTiJjfdWjsXatqpx8S
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4588 wrote to memory of 736 4588 112c521f221908ec924d0b88ffc741b392d04ee5d8076d2d700e3566e42f6df8.exe 81 PID 4588 wrote to memory of 736 4588 112c521f221908ec924d0b88ffc741b392d04ee5d8076d2d700e3566e42f6df8.exe 81 PID 4588 wrote to memory of 736 4588 112c521f221908ec924d0b88ffc741b392d04ee5d8076d2d700e3566e42f6df8.exe 81 PID 4588 wrote to memory of 1424 4588 112c521f221908ec924d0b88ffc741b392d04ee5d8076d2d700e3566e42f6df8.exe 82 PID 4588 wrote to memory of 1424 4588 112c521f221908ec924d0b88ffc741b392d04ee5d8076d2d700e3566e42f6df8.exe 82 PID 4588 wrote to memory of 1424 4588 112c521f221908ec924d0b88ffc741b392d04ee5d8076d2d700e3566e42f6df8.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\112c521f221908ec924d0b88ffc741b392d04ee5d8076d2d700e3566e42f6df8.exe"C:\Users\Admin\AppData\Local\Temp\112c521f221908ec924d0b88ffc741b392d04ee5d8076d2d700e3566e42f6df8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\112c521f221908ec924d0b88ffc741b392d04ee5d8076d2d700e3566e42f6df8.exestart2⤵PID:736
-
-
C:\Users\Admin\AppData\Local\Temp\112c521f221908ec924d0b88ffc741b392d04ee5d8076d2d700e3566e42f6df8.exewatch2⤵PID:1424
-