Analysis
-
max time kernel
164s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:46
Static task
static1
Behavioral task
behavioral1
Sample
8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe
Resource
win10v2004-20221111-en
General
-
Target
8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe
-
Size
104KB
-
MD5
8aa6527fe746c81cda4e7583340bd8b7
-
SHA1
67b7e92e2d75b0928dc35921ecd220cf8bcc0b2a
-
SHA256
8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85
-
SHA512
94e9a5f010928b53d1d68c8abd970e34baefffacb0b4b7446d8f2f1b0b364b81336f2e195f6b95e3f55d0d1b5703d8b6a4f76a618b4c56fcf8afb6d2ea0c390b
-
SSDEEP
1536:Nh98TBsfJQ/XNng6jBmEMxqETw48PKqSZDvEI3c9t5sNG9ACenAC7RMB2DTALP:uBsBQPNgsKhDvEb9vDA5na2ID
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exepid process 4352 8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe 4352 8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exedescription pid process target process PID 616 wrote to memory of 4352 616 8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe 8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe PID 616 wrote to memory of 4352 616 8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe 8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe PID 616 wrote to memory of 4352 616 8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe 8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe"C:\Users\Admin\AppData\Local\Temp\8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe"C:\Users\Admin\AppData\Local\Temp\8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD5e85cb39940d6d87f85824a5ecd3030e4
SHA186ee22608b0190e41e5740bd00e9686466b93298
SHA2569322ca9fd4fe200e5445d67e1fa81ac875acd7060bb5f54cb195eb5be4d7de9c
SHA512c28d3648ef42bb7fe9c4b787f978b89c70c924f045cbeb3619b778d92bcdb4beb099e01bcfe7474c1356456ebfe94cd4acdf2d6b40f30477c2c859194749a79e