Analysis
-
max time kernel
188s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:24
Static task
static1
Behavioral task
behavioral1
Sample
0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exe
Resource
win10v2004-20221111-en
General
-
Target
0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exe
-
Size
518KB
-
MD5
6e8bfa5cd09f2a195ecd794553178dcc
-
SHA1
66d430e9b42be478cbb8e03c059fd667a645d206
-
SHA256
0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe
-
SHA512
c54462b80312ff70c3807153964d5465e429fdadb20cfb74e1a116b6c05b3a919a7a8608294669036404c24fa9abf6219b210190eed513bb5acf4a90cca04856
-
SSDEEP
12288:zLd1ea3n5qIfgFP1LQwsYwYYlLPt5oKnWq3yb:zzeOqIfgFolLPt5/Wn
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exedescription pid process target process PID 5048 wrote to memory of 1676 5048 0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exe 0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exe PID 5048 wrote to memory of 1676 5048 0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exe 0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exe PID 5048 wrote to memory of 1676 5048 0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exe 0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exe PID 5048 wrote to memory of 5116 5048 0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exe 0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exe PID 5048 wrote to memory of 5116 5048 0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exe 0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exe PID 5048 wrote to memory of 5116 5048 0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exe 0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exe"C:\Users\Admin\AppData\Local\Temp\0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exestart2⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\0f3f012757ee322fd83c678ab1584571b8573eea8b4e0ea686cd9ff2b4ed99fe.exewatch2⤵PID:5116