Analysis
-
max time kernel
144s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:01
Static task
static1
Behavioral task
behavioral1
Sample
9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exe
Resource
win10v2004-20220812-en
General
-
Target
9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exe
-
Size
522KB
-
MD5
4e87e0568071c371699b22d6b4fd3b11
-
SHA1
d14a82be42d1be8433cdefc17a4525fa77e2470e
-
SHA256
9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088
-
SHA512
208f7dd052e4061fd44f80e5662ff4089def3f5bcba5a7aaba9d27777c2c63e498f1468ac6e8612f7ea22eb9bf085f686107f548d696e7f0852a32b6b54c461f
-
SSDEEP
12288:D+Xb4r9CxWvgKXzwxlOf59By18xQqpx8O5/0:DsM/1XzwShDatqpx8f
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exedescription pid process target process PID 3472 wrote to memory of 4640 3472 9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exe 9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exe PID 3472 wrote to memory of 4640 3472 9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exe 9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exe PID 3472 wrote to memory of 4640 3472 9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exe 9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exe PID 3472 wrote to memory of 3324 3472 9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exe 9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exe PID 3472 wrote to memory of 3324 3472 9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exe 9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exe PID 3472 wrote to memory of 3324 3472 9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exe 9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exe"C:\Users\Admin\AppData\Local\Temp\9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exestart2⤵PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\9aa42495c4d692246a70abcbe525863303a4b0609705bd70ac238c8ed8a10088.exewatch2⤵PID:3324
-