Analysis
-
max time kernel
92s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:16
Static task
static1
Behavioral task
behavioral1
Sample
572b522f645e4c99ffbc32cd0bcea3b163d196521dc2edbd5e9db848f3490aad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
572b522f645e4c99ffbc32cd0bcea3b163d196521dc2edbd5e9db848f3490aad.exe
Resource
win10v2004-20220812-en
General
-
Target
572b522f645e4c99ffbc32cd0bcea3b163d196521dc2edbd5e9db848f3490aad.exe
-
Size
148KB
-
MD5
e64b91a785c67b1c81ca40b7c951cb74
-
SHA1
fff5ee6777fdec4bca9128bae594f073ef68a8b4
-
SHA256
572b522f645e4c99ffbc32cd0bcea3b163d196521dc2edbd5e9db848f3490aad
-
SHA512
d70e1264803e6ed96f611001d4dea21c13a2d115a102dd41c4a34a49d3657eaeef5f297732b0b16693376ede7016c2c9276976c709246650065c4f603a06e3d6
-
SSDEEP
3072:gcsk5EkOTRRPDQMbPcUVlffIL7+4NaskiidoEE:xhO7JQUV63adoEE
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3592-134-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/3592-138-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/3592-137-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/3592-140-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/3592-141-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
572b522f645e4c99ffbc32cd0bcea3b163d196521dc2edbd5e9db848f3490aad.exedescription pid process target process PID 2500 wrote to memory of 3592 2500 572b522f645e4c99ffbc32cd0bcea3b163d196521dc2edbd5e9db848f3490aad.exe 572b522f645e4c99ffbc32cd0bcea3b163d196521dc2edbd5e9db848f3490aad.exe PID 2500 wrote to memory of 3592 2500 572b522f645e4c99ffbc32cd0bcea3b163d196521dc2edbd5e9db848f3490aad.exe 572b522f645e4c99ffbc32cd0bcea3b163d196521dc2edbd5e9db848f3490aad.exe PID 2500 wrote to memory of 3592 2500 572b522f645e4c99ffbc32cd0bcea3b163d196521dc2edbd5e9db848f3490aad.exe 572b522f645e4c99ffbc32cd0bcea3b163d196521dc2edbd5e9db848f3490aad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\572b522f645e4c99ffbc32cd0bcea3b163d196521dc2edbd5e9db848f3490aad.exe"C:\Users\Admin\AppData\Local\Temp\572b522f645e4c99ffbc32cd0bcea3b163d196521dc2edbd5e9db848f3490aad.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\572b522f645e4c99ffbc32cd0bcea3b163d196521dc2edbd5e9db848f3490aad.exe?2⤵PID:3592
-