Analysis
-
max time kernel
209s -
max time network
240s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:55
Static task
static1
Behavioral task
behavioral1
Sample
c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exe
Resource
win10v2004-20221111-en
General
-
Target
c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exe
-
Size
522KB
-
MD5
b79b607fa0b03ae386a8ffae372683b2
-
SHA1
f0e59b96ed0a9f7713dc9dbbe3717ad6ef29adce
-
SHA256
c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c
-
SHA512
ef369e89f7ea92963e50d32e843ad5032fe755576de20b865be3848985dcfbb651738a1d136dd7d76c67517ce5e0ca186544fdcae61fd13f5dfe3ab225f07ec1
-
SSDEEP
12288:Oa2BeTCevIf564O/WSXny18xQqpx8O5Na:PWeO5RO13atqpx8t
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exedescription pid process target process PID 3264 wrote to memory of 3468 3264 c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exe c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exe PID 3264 wrote to memory of 3468 3264 c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exe c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exe PID 3264 wrote to memory of 3468 3264 c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exe c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exe PID 3264 wrote to memory of 4468 3264 c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exe c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exe PID 3264 wrote to memory of 4468 3264 c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exe c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exe PID 3264 wrote to memory of 4468 3264 c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exe c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exe"C:\Users\Admin\AppData\Local\Temp\c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exestart2⤵PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\c1d3caa271d240052a8a04547ca506c1b39c4dbe918d5db5aa81ed027b194d8c.exewatch2⤵PID:4468
-