Analysis
-
max time kernel
163s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:23
Static task
static1
Behavioral task
behavioral1
Sample
11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exe
Resource
win10v2004-20220812-en
General
-
Target
11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exe
-
Size
522KB
-
MD5
e5ecc53366b4eac962f7b4668f87cd8a
-
SHA1
c31f346032050beda5540664393676c1732aeafc
-
SHA256
11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94
-
SHA512
1ea558a8a20802d5fbda27587d281afc4c4cb3ddd91e7996c819a46ae4ceac6b6095107a973ba824b1d67dee08e399cfcc6cc5d6dc60cddf33345def88705496
-
SSDEEP
12288:3I9V+8qRQ3XMIQj4nShdsEry18xQqpx8O5p7:3I9A8qRwXM8Szs2atqpx8K
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exedescription pid process target process PID 4636 wrote to memory of 3048 4636 11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exe 11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exe PID 4636 wrote to memory of 3048 4636 11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exe 11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exe PID 4636 wrote to memory of 3048 4636 11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exe 11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exe PID 4636 wrote to memory of 5016 4636 11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exe 11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exe PID 4636 wrote to memory of 5016 4636 11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exe 11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exe PID 4636 wrote to memory of 5016 4636 11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exe 11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exe"C:\Users\Admin\AppData\Local\Temp\11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exestart2⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\11b28f14b4b77d7ecf5f2f25c49bb98ada4902d05ee683cd7f466167f4fd5b94.exewatch2⤵PID:5016