Analysis
-
max time kernel
177s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:11
Static task
static1
Behavioral task
behavioral1
Sample
65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exe
Resource
win10v2004-20221111-en
General
-
Target
65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exe
-
Size
522KB
-
MD5
5e647e358b77729754b4fab2b785a52a
-
SHA1
60f8731248c20633972112992e535a47d40d1b77
-
SHA256
65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f
-
SHA512
e0708c676ac68479f8869d16ea5eb4b545053f375b941bc35d985175bb7a7d6a9bef2b367bbb0add003050bc97f5c717f0a8bd5e67786585e388764e36b4d550
-
SSDEEP
6144:TyarGKkEzhWC2MkZxCEgaNc0r+10HfVw2lMRRcvf+TySmQy1CrxQqD9RSaSz+8Oq:uESPnCDMhlycn+TBy18xQqpx8O51
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exedescription pid process target process PID 228 wrote to memory of 2092 228 65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exe 65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exe PID 228 wrote to memory of 2092 228 65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exe 65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exe PID 228 wrote to memory of 2092 228 65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exe 65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exe PID 228 wrote to memory of 900 228 65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exe 65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exe PID 228 wrote to memory of 900 228 65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exe 65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exe PID 228 wrote to memory of 900 228 65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exe 65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exe"C:\Users\Admin\AppData\Local\Temp\65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exestart2⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\65cbc888285db56f4accc07255a87021893b11a685758ff9bdf5fc6264a22f9f.exewatch2⤵PID:900