Analysis
-
max time kernel
245s -
max time network
280s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:55
Static task
static1
Behavioral task
behavioral1
Sample
c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exe
Resource
win10v2004-20221111-en
General
-
Target
c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exe
-
Size
518KB
-
MD5
5322027c7440ca2402f50c41bd65135d
-
SHA1
815fbe8ad2d28386f835f7e0be6f023b034866c6
-
SHA256
c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242
-
SHA512
52d9575a5c9f9affef1177b24fcdf5bcdb59129a733a5904fbb008591e048d16104789334fcdb01b2165113b3a48fde39c98fd46f1f77c2d5681921063bb559c
-
SSDEEP
6144:0F6AQrRKuJG/DAxe+WDQTfIeha3u1GC6gW28DZJVjwlw75G9+lLPX9MM8e459KO9:k6AYIDRACKICwYYlLPt5oKnWq37bH
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exedescription pid process target process PID 4172 wrote to memory of 4504 4172 c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exe c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exe PID 4172 wrote to memory of 4504 4172 c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exe c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exe PID 4172 wrote to memory of 4504 4172 c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exe c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exe PID 4172 wrote to memory of 3056 4172 c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exe c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exe PID 4172 wrote to memory of 3056 4172 c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exe c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exe PID 4172 wrote to memory of 3056 4172 c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exe c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exe"C:\Users\Admin\AppData\Local\Temp\c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exestart2⤵PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\c3baf551377a278b7e27bb8262f28b7d14cac436e0629782a240c63ade72c242.exewatch2⤵PID:3056
-