Analysis
-
max time kernel
91s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:10
Static task
static1
Behavioral task
behavioral1
Sample
e2bc997d407083d2292b7fdb4f21d9f848e6134e50f46be6d4deca6d9ceddadb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e2bc997d407083d2292b7fdb4f21d9f848e6134e50f46be6d4deca6d9ceddadb.exe
Resource
win10v2004-20220901-en
General
-
Target
e2bc997d407083d2292b7fdb4f21d9f848e6134e50f46be6d4deca6d9ceddadb.exe
-
Size
527KB
-
MD5
2c59bcf1523158d403dc8b0084691845
-
SHA1
9b423f6ad060c96929c7ff6c3c654597954f0f88
-
SHA256
e2bc997d407083d2292b7fdb4f21d9f848e6134e50f46be6d4deca6d9ceddadb
-
SHA512
74877ae38db8876041f1ade8751ad94e80ad742811e2d2bcae6b4697505883ffd6ed802d3bbae6f3241d334a0037ec46ad91ceba8c0d3a064cb79b55c3a62e50
-
SSDEEP
12288:BRnAv/8gc/CfuzgQpTQ2M+/EIBNvNMCsl4K30pipAX:BRi2Cf7+i+VKCseK3Rpa
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
e2bc997d407083d2292b7fdb4f21d9f848e6134e50f46be6d4deca6d9ceddadb.exedescription pid process target process PID 4316 wrote to memory of 776 4316 e2bc997d407083d2292b7fdb4f21d9f848e6134e50f46be6d4deca6d9ceddadb.exe e2bc997d407083d2292b7fdb4f21d9f848e6134e50f46be6d4deca6d9ceddadb.exe PID 4316 wrote to memory of 776 4316 e2bc997d407083d2292b7fdb4f21d9f848e6134e50f46be6d4deca6d9ceddadb.exe e2bc997d407083d2292b7fdb4f21d9f848e6134e50f46be6d4deca6d9ceddadb.exe PID 4316 wrote to memory of 776 4316 e2bc997d407083d2292b7fdb4f21d9f848e6134e50f46be6d4deca6d9ceddadb.exe e2bc997d407083d2292b7fdb4f21d9f848e6134e50f46be6d4deca6d9ceddadb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2bc997d407083d2292b7fdb4f21d9f848e6134e50f46be6d4deca6d9ceddadb.exe"C:\Users\Admin\AppData\Local\Temp\e2bc997d407083d2292b7fdb4f21d9f848e6134e50f46be6d4deca6d9ceddadb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\e2bc997d407083d2292b7fdb4f21d9f848e6134e50f46be6d4deca6d9ceddadb.exetear2⤵PID:776