Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:18
Static task
static1
Behavioral task
behavioral1
Sample
358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exe
Resource
win10v2004-20220812-en
General
-
Target
358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exe
-
Size
518KB
-
MD5
28b4a87db52aaaa90aa0fd54053ea17a
-
SHA1
718ae51668dcb31cae9afdddeee52f87facf1b0b
-
SHA256
358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb
-
SHA512
3b678da20da4dfb91cd550ebabe9faf383f0330009e87206cf1369b606bf4270c680610740f0580ab32ab16b3bdab240091d00873fd3ac248eb7a0edbc3e44e0
-
SSDEEP
12288:wqXLhqTVJ5MqawVSqwYYlLPt5oKnWq3Yb9:wqVqTr5tdSrlLPt5/Wp9
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exedescription pid process target process PID 4792 wrote to memory of 1864 4792 358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exe 358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exe PID 4792 wrote to memory of 1864 4792 358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exe 358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exe PID 4792 wrote to memory of 1864 4792 358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exe 358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exe PID 4792 wrote to memory of 4992 4792 358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exe 358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exe PID 4792 wrote to memory of 4992 4792 358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exe 358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exe PID 4792 wrote to memory of 4992 4792 358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exe 358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exe"C:\Users\Admin\AppData\Local\Temp\358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exestart2⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\358671230b2a678bced48c4a729dc83cc4cb0be3f7fde165650cec471c54a7bb.exewatch2⤵PID:4992