Analysis
-
max time kernel
91s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:10
Static task
static1
Behavioral task
behavioral1
Sample
f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exe
Resource
win10v2004-20220901-en
General
-
Target
f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exe
-
Size
518KB
-
MD5
defa9d319d990962565df155d3f50463
-
SHA1
d63699ef02aabfa130e9a4b26c32a9b12da6b705
-
SHA256
f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb
-
SHA512
641b3f0b329e3bfe84c302ed256a991828cd5803f8a6bf4350e4701b264c52d27c523a91e348676a855ea3fab3e0abf805084663d9f5742cac75d95bb672783f
-
SSDEEP
6144:UyumN5bmJtYQ4lKYJUUpT4fUdjfwM/FG+lw75G9+lLPX9MM8e459KOoWqe6w58WV:jzb5Rd/9wYYlLPt5oKnWq3Gb
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exedescription pid process target process PID 4372 wrote to memory of 1340 4372 f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exe f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exe PID 4372 wrote to memory of 1340 4372 f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exe f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exe PID 4372 wrote to memory of 1340 4372 f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exe f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exe PID 4372 wrote to memory of 2168 4372 f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exe f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exe PID 4372 wrote to memory of 2168 4372 f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exe f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exe PID 4372 wrote to memory of 2168 4372 f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exe f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exe"C:\Users\Admin\AppData\Local\Temp\f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exestart2⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\f0c641b6cfd3697f469a8bcc6e7d05f9f5829eff23f37d333ec965cf50f77efb.exewatch2⤵PID:2168