Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:18
Static task
static1
Behavioral task
behavioral1
Sample
31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exe
Resource
win10v2004-20220812-en
General
-
Target
31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exe
-
Size
518KB
-
MD5
c0f2d8f575cc1128799df81f67d12935
-
SHA1
d78d033dc3d90b9b5daa4c3fac8dd15de9ca94bd
-
SHA256
31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776
-
SHA512
d37290894d518a59738bbfde3754a41df595998d13e4ecef01606c204bce1ec6bb33c46ba9bba910c85a664048d240c5ab9c1ddf2ad0342a1b2f66df8ef46e78
-
SSDEEP
12288:6o2fHBk7J7n/3WdQtmDrVwYYlLPt5oKnWq3tb:uk7Jb/3WdQQrSlLPt5/Wg
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exedescription pid process target process PID 4712 wrote to memory of 3312 4712 31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exe 31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exe PID 4712 wrote to memory of 3312 4712 31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exe 31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exe PID 4712 wrote to memory of 3312 4712 31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exe 31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exe PID 4712 wrote to memory of 5088 4712 31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exe 31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exe PID 4712 wrote to memory of 5088 4712 31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exe 31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exe PID 4712 wrote to memory of 5088 4712 31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exe 31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exe"C:\Users\Admin\AppData\Local\Temp\31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exestart2⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\31aafa4b2cf3c0807283f1d2aabb23a82361231a6cf7e45aa1a0ce4739565776.exewatch2⤵PID:5088