Analysis
-
max time kernel
187s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:36
Static task
static1
Behavioral task
behavioral1
Sample
fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe
Resource
win10v2004-20221111-en
General
-
Target
fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe
-
Size
533KB
-
MD5
a210b3c39a94299cffb2193f5da42c7c
-
SHA1
9e389d6591c2f2d9c2dcaf0e2548bc843444ec9a
-
SHA256
fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25
-
SHA512
861a56a54a23515abced971be33cd03f9d02f23db2a85a8210f4363d5ec82f435f7db4ed381256ede317a9906b40cdae9dae445c296eab1762af3bbd9f774a67
-
SSDEEP
6144:znIqTgLHwMBW2HL+pmxjU0nNvNOHPQXnj80bVmFXSgOgZGK8JU4yk7owH9OgmBef:zI2gLQPz90NvNMEmNfqJU4bbmRHwzq
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exedescription pid process target process PID 1896 wrote to memory of 2320 1896 fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe PID 1896 wrote to memory of 2320 1896 fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe PID 1896 wrote to memory of 2320 1896 fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe"C:\Users\Admin\AppData\Local\Temp\fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exetear2⤵PID:2320
-