Analysis
-
max time kernel
311s -
max time network
349s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:10
Static task
static1
Behavioral task
behavioral1
Sample
a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exe
Resource
win10v2004-20221111-en
General
-
Target
a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exe
-
Size
522KB
-
MD5
4209bdb1dc60134c6828028d22fa6c3a
-
SHA1
71a10ade22fddd5f0472e8cd744d938c2c9dc9a8
-
SHA256
a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8
-
SHA512
3a37144d4ed741d3eb8652c26a667cf1c64bcf9a925b141f4cd705987a815e45fa7b2987704b03e5069866558ec96e2a16557cb0f9e8f13f7a5e5049f08d13c1
-
SSDEEP
6144:WGzTaowuX2HuOwti5kluL6jZUgnfkQ8bcNCFkaVQ+mQy1CrxQqD9RSaSz+8O5vTX:1zTNJEGwLvViM6aVQ2y18xQqpx8O5v
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exedescription pid process target process PID 4220 wrote to memory of 5024 4220 a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exe a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exe PID 4220 wrote to memory of 5024 4220 a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exe a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exe PID 4220 wrote to memory of 5024 4220 a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exe a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exe PID 4220 wrote to memory of 4840 4220 a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exe a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exe PID 4220 wrote to memory of 4840 4220 a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exe a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exe PID 4220 wrote to memory of 4840 4220 a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exe a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exe"C:\Users\Admin\AppData\Local\Temp\a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exestart2⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\a43b931d590d53c42984e1c8c9aaeb5eb2c6d9c7935a97b53faa71e4d12d99f8.exewatch2⤵PID:4840