Analysis
-
max time kernel
87s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:19
Static task
static1
Behavioral task
behavioral1
Sample
b44a5c282d928dc41b99ea17339789c4a7e1987c42d90e3eff00373360c3a30e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b44a5c282d928dc41b99ea17339789c4a7e1987c42d90e3eff00373360c3a30e.exe
Resource
win10v2004-20220901-en
General
-
Target
b44a5c282d928dc41b99ea17339789c4a7e1987c42d90e3eff00373360c3a30e.exe
-
Size
524KB
-
MD5
885ebe211837c9051e48ce6aaad2faae
-
SHA1
66a2184360ba073c6403ef245b11b6bf0663af41
-
SHA256
b44a5c282d928dc41b99ea17339789c4a7e1987c42d90e3eff00373360c3a30e
-
SHA512
cdaa3c9b45fa428df9551e3b7a744870258281b4daa01bd53196eeb41aa3e582dc594ac145fcf3871afeb9f8db238fa5e1f59b204c32b3522605a550163042f3
-
SSDEEP
12288:kT6FTVpZ9W6jAS/VZlHVzvBVKXCuapzDBG:keffsiZVzvSXCXD
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
b44a5c282d928dc41b99ea17339789c4a7e1987c42d90e3eff00373360c3a30e.exedescription pid process target process PID 2828 wrote to memory of 3480 2828 b44a5c282d928dc41b99ea17339789c4a7e1987c42d90e3eff00373360c3a30e.exe b44a5c282d928dc41b99ea17339789c4a7e1987c42d90e3eff00373360c3a30e.exe PID 2828 wrote to memory of 3480 2828 b44a5c282d928dc41b99ea17339789c4a7e1987c42d90e3eff00373360c3a30e.exe b44a5c282d928dc41b99ea17339789c4a7e1987c42d90e3eff00373360c3a30e.exe PID 2828 wrote to memory of 3480 2828 b44a5c282d928dc41b99ea17339789c4a7e1987c42d90e3eff00373360c3a30e.exe b44a5c282d928dc41b99ea17339789c4a7e1987c42d90e3eff00373360c3a30e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b44a5c282d928dc41b99ea17339789c4a7e1987c42d90e3eff00373360c3a30e.exe"C:\Users\Admin\AppData\Local\Temp\b44a5c282d928dc41b99ea17339789c4a7e1987c42d90e3eff00373360c3a30e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\b44a5c282d928dc41b99ea17339789c4a7e1987c42d90e3eff00373360c3a30e.exetear2⤵PID:3480
-