Analysis
-
max time kernel
139s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:14
Static task
static1
Behavioral task
behavioral1
Sample
5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exe
Resource
win10v2004-20221111-en
General
-
Target
5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exe
-
Size
522KB
-
MD5
7480082b72a71203c50005bc8b12c028
-
SHA1
b8e4d4de9dc37e7ea7a2378e579feb710c12bee4
-
SHA256
5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f
-
SHA512
549a8a9b0b150df67aaa4154909517a8b9e5f236c002affaea959e330e54df8d2d0510f096e2e62150ad578dc6fc456b8f69a399540c60bae32970008f04404d
-
SSDEEP
6144:J/f2QHxAscSQjdsyBsb4kG1p6QPiMNHZY4oFBku8gQ95mQy1CrxQqD9RSaSz+8O1:E7NSQjdsyX1ykuyy18xQqpx8O5j
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exedescription pid process target process PID 204 wrote to memory of 4832 204 5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exe 5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exe PID 204 wrote to memory of 4832 204 5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exe 5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exe PID 204 wrote to memory of 4832 204 5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exe 5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exe PID 204 wrote to memory of 4724 204 5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exe 5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exe PID 204 wrote to memory of 4724 204 5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exe 5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exe PID 204 wrote to memory of 4724 204 5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exe 5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exe"C:\Users\Admin\AppData\Local\Temp\5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Users\Admin\AppData\Local\Temp\5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exewatch2⤵PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\5a4fea89934fa90efc0afd8feccfd5bc534fcddabca4062ff37c1fb68ed5f26f.exestart2⤵PID:4832
-