Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:23
Static task
static1
Behavioral task
behavioral1
Sample
131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exe
Resource
win10v2004-20221111-en
General
-
Target
131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exe
-
Size
522KB
-
MD5
b0abc271970a1fb8777c41aa22812277
-
SHA1
3d909291f9ef78c34806a6b3f2f187b436f7b0f2
-
SHA256
131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db
-
SHA512
e131f35d9ae3b72b823c3f31b10ad2de532801df2bc9939d0ebcef39df891eea622d271f2859ad2de386a61baaac25f7a6d362c741812d6b9e3a658dca5c674e
-
SSDEEP
12288:vdD+aCLiROprgOxAs2GUwYYlLPt5oKnWq3rBbi:vpJwpVlLPt5/WAi
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exedescription pid process target process PID 4280 wrote to memory of 4564 4280 131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exe 131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exe PID 4280 wrote to memory of 4564 4280 131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exe 131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exe PID 4280 wrote to memory of 4564 4280 131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exe 131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exe PID 4280 wrote to memory of 2700 4280 131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exe 131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exe PID 4280 wrote to memory of 2700 4280 131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exe 131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exe PID 4280 wrote to memory of 2700 4280 131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exe 131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exe"C:\Users\Admin\AppData\Local\Temp\131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exestart2⤵PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\131402fb2dd52ab54c56c6c35348fdbf8c21fa0749a02e358437b91fefb157db.exewatch2⤵PID:2700
-