Analysis
-
max time kernel
92s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:36
Static task
static1
Behavioral task
behavioral1
Sample
97d2ffc9d5ca1e823d728719575d7ab4c88b63636dbf41b25b0729e20ece992f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
97d2ffc9d5ca1e823d728719575d7ab4c88b63636dbf41b25b0729e20ece992f.exe
Resource
win10v2004-20220812-en
General
-
Target
97d2ffc9d5ca1e823d728719575d7ab4c88b63636dbf41b25b0729e20ece992f.exe
-
Size
524KB
-
MD5
d0fc0614b6465ed557646716af2b0574
-
SHA1
03df1c7d9c5773af81f36c614f7a8f472803dae8
-
SHA256
97d2ffc9d5ca1e823d728719575d7ab4c88b63636dbf41b25b0729e20ece992f
-
SHA512
c60ecf0d916637cdb23909f0415e1ab0dc58d99ced3e5cc6a54f08e5ca5c6d2cca86dcf4863a8cb9ce2e0d58de3b71889f52af5e6838ec018e991f1bb74e5cde
-
SSDEEP
12288:F/QVSlVUpR4Pkqg5fBrpDhVzvBVKXCuapzDBG:FoIERekqgnr3VzvSXCXD
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
97d2ffc9d5ca1e823d728719575d7ab4c88b63636dbf41b25b0729e20ece992f.exedescription pid process target process PID 4284 wrote to memory of 228 4284 97d2ffc9d5ca1e823d728719575d7ab4c88b63636dbf41b25b0729e20ece992f.exe 97d2ffc9d5ca1e823d728719575d7ab4c88b63636dbf41b25b0729e20ece992f.exe PID 4284 wrote to memory of 228 4284 97d2ffc9d5ca1e823d728719575d7ab4c88b63636dbf41b25b0729e20ece992f.exe 97d2ffc9d5ca1e823d728719575d7ab4c88b63636dbf41b25b0729e20ece992f.exe PID 4284 wrote to memory of 228 4284 97d2ffc9d5ca1e823d728719575d7ab4c88b63636dbf41b25b0729e20ece992f.exe 97d2ffc9d5ca1e823d728719575d7ab4c88b63636dbf41b25b0729e20ece992f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97d2ffc9d5ca1e823d728719575d7ab4c88b63636dbf41b25b0729e20ece992f.exe"C:\Users\Admin\AppData\Local\Temp\97d2ffc9d5ca1e823d728719575d7ab4c88b63636dbf41b25b0729e20ece992f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\97d2ffc9d5ca1e823d728719575d7ab4c88b63636dbf41b25b0729e20ece992f.exetear2⤵PID:228