Analysis
-
max time kernel
198s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:11
Static task
static1
Behavioral task
behavioral1
Sample
62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe
Resource
win10v2004-20221111-en
General
-
Target
62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe
-
Size
526KB
-
MD5
229961a95c1e40dbbc38ed70f44868b3
-
SHA1
ab104683122b0defbe8e29f700f464011c4a069e
-
SHA256
62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384
-
SHA512
513e50ab90c4b1a8060a58775aa3622d23b26488d0885373c79faf7cfda823021b2f356e7db585f1088f0330b50e8be3b0b2a28ed39462eb08b776a8122d1334
-
SSDEEP
12288:CNFtpambaoGJfA7i+i/HQy18xQqpx8O5lE:CpnmHQatqpx81
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exedescription pid process target process PID 4272 wrote to memory of 4520 4272 62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe 62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe PID 4272 wrote to memory of 4520 4272 62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe 62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe PID 4272 wrote to memory of 4520 4272 62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe 62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe PID 4272 wrote to memory of 4204 4272 62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe 62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe PID 4272 wrote to memory of 4204 4272 62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe 62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe PID 4272 wrote to memory of 4204 4272 62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe 62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe"C:\Users\Admin\AppData\Local\Temp\62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exestart2⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exewatch2⤵PID:4204