Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:21
Static task
static1
Behavioral task
behavioral1
Sample
21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exe
Resource
win10v2004-20220812-en
General
-
Target
21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exe
-
Size
522KB
-
MD5
08a04380589faa93184fa19e3858c18a
-
SHA1
742856e2a83a551e4610395021b18fef9cc2fd21
-
SHA256
21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d
-
SHA512
49b73a645254995c6ca23f5e97b84cf218e70cc4946cf82cc8c110edcb29c36ea80cb7e3f4a9fc5dd289d581e733e173dff5d327caaf77ee112abd651e78b1fe
-
SSDEEP
6144:H7YHKbZFh40abNJCJHOUBkyxvqkXUycSm87PnGXmQy1CrxQqD9RSaSz+8O5aDp:0WLhBqyxvqzi7Qy18xQqpx8O5a
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exedescription pid process target process PID 4528 wrote to memory of 5012 4528 21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exe 21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exe PID 4528 wrote to memory of 5012 4528 21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exe 21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exe PID 4528 wrote to memory of 5012 4528 21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exe 21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exe PID 4528 wrote to memory of 4320 4528 21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exe 21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exe PID 4528 wrote to memory of 4320 4528 21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exe 21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exe PID 4528 wrote to memory of 4320 4528 21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exe 21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exe"C:\Users\Admin\AppData\Local\Temp\21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exestart2⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\21998ca514a4f0a198a4582bab44a84a15f7e5dc3d27c3f4f36936e601ac3e9d.exewatch2⤵PID:4320