Analysis
-
max time kernel
176s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:21
Static task
static1
Behavioral task
behavioral1
Sample
21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exe
Resource
win10v2004-20221111-en
General
-
Target
21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exe
-
Size
522KB
-
MD5
022ac2e635ac89012424f96c77389c6a
-
SHA1
6e0e7882a6d7d025bd6569cd5be4d28d6f2b3bef
-
SHA256
21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a
-
SHA512
e6a28a0e0d856f44322eb8548a0a493dc7b9cdb783b0b4c2e2aa5525a8e49627b927d4301e920da2e231270d4c5f6aec8d3e5ed4cdb5476a48c2189501cee96d
-
SSDEEP
6144:57wzrwvC6VeCpEEdrSSOZ4kmfIWEWvjy1INI9n94U7F/DDkRnFmQy1CrxQqD9RSK:dE8rSrOkmf8Oy6KnYxHy18xQqpx8O5N
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exedescription pid process target process PID 4720 wrote to memory of 1524 4720 21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exe 21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exe PID 4720 wrote to memory of 1524 4720 21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exe 21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exe PID 4720 wrote to memory of 1524 4720 21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exe 21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exe PID 4720 wrote to memory of 1536 4720 21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exe 21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exe PID 4720 wrote to memory of 1536 4720 21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exe 21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exe PID 4720 wrote to memory of 1536 4720 21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exe 21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exe"C:\Users\Admin\AppData\Local\Temp\21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exestart2⤵PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\21e01b4170ab557a4884203216c32660cd2befe6941635907889358db793874a.exewatch2⤵PID:1536
-