Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:17
Static task
static1
Behavioral task
behavioral1
Sample
5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01.exe
Resource
win10v2004-20220812-en
General
-
Target
5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01.exe
-
Size
519KB
-
MD5
6384c0a3d602de59b414229e6ea3575e
-
SHA1
c17c7f309e7b8bea54b0077899851628180baa21
-
SHA256
5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01
-
SHA512
0ddbee4d46ad3d8b4165b1fcedd6144290e16dabff8758e27bdc88b04c69c4874ed467b905bf5c94d144a0ae0aa605608e535d0f7a35a151a2143ffbd0dca6c5
-
SSDEEP
12288:UtRu0JLWQIfq/QfbU9xFttUd24BWJ6e4gpnO:UboQIrm8d24sJb
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01.exedescription pid process target process PID 2256 wrote to memory of 3988 2256 5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01.exe 5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01.exe PID 2256 wrote to memory of 3988 2256 5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01.exe 5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01.exe PID 2256 wrote to memory of 3988 2256 5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01.exe 5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01.exe"C:\Users\Admin\AppData\Local\Temp\5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01.exetear2⤵PID:3988
-