Analysis
-
max time kernel
188s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:02
Static task
static1
Behavioral task
behavioral1
Sample
d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe
Resource
win10v2004-20221111-en
General
-
Target
d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe
-
Size
524KB
-
MD5
fa498417960cbedd8f5a00e6b0b3e198
-
SHA1
04b2328016fd5fe169fc16975cc0410469f0de21
-
SHA256
d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327
-
SHA512
503dd5e4fd8f4ed9952665f76b1ea234a7f9604133640c10db87feab81e1caf54fe5e491ea66297dfd7212f759657529f716598ecba97643d9150ea9a31451bc
-
SSDEEP
12288:0k/cy/pFFi/2WIqAuq3d1/Wv4bON/uL63PTb/g0OJp/Zbj:b/c+WTc1eOy/uE/QfxX
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exedescription pid process target process PID 4260 wrote to memory of 3780 4260 d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe PID 4260 wrote to memory of 3780 4260 d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe PID 4260 wrote to memory of 3780 4260 d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe PID 4260 wrote to memory of 4848 4260 d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe PID 4260 wrote to memory of 4848 4260 d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe PID 4260 wrote to memory of 4848 4260 d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe"C:\Users\Admin\AppData\Local\Temp\d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exestart2⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exewatch2⤵PID:4848