Analysis
-
max time kernel
176s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:50
Static task
static1
Behavioral task
behavioral1
Sample
e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe
Resource
win10v2004-20221111-en
General
-
Target
e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe
-
Size
522KB
-
MD5
416b0d077aecd63b3bba3226e2b09ce6
-
SHA1
77a87280bba0fc1363b74c9f50d61f056d666e3e
-
SHA256
e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b
-
SHA512
34719c14b5c92b496438a2dd201a63facf38ee104e0541daa2274637bdc4b58826e33e78ed31922e7faf4484627d12b0e934f1da4d203d824a36a7923ac39bb2
-
SSDEEP
6144:WnHWm7WPjIeOP1C2Ef+L5ADznZ6j9b0lqGVWrk7mumQy1CrxQqD9RSaSz+8O59j3:O+rM7XL58Z6hbXGKoy18xQqpx8O59
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exedescription pid process target process PID 4612 wrote to memory of 2516 4612 e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe PID 4612 wrote to memory of 2516 4612 e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe PID 4612 wrote to memory of 2516 4612 e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe PID 4612 wrote to memory of 3852 4612 e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe PID 4612 wrote to memory of 3852 4612 e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe PID 4612 wrote to memory of 3852 4612 e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe"C:\Users\Admin\AppData\Local\Temp\e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exestart2⤵PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exewatch2⤵PID:3852
-