Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:24
Static task
static1
Behavioral task
behavioral1
Sample
499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe
Resource
win10v2004-20220812-en
General
-
Target
499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe
-
Size
522KB
-
MD5
40ba0562c821664f065047a20db42610
-
SHA1
db9cce0b36edd5a9793d3d9c34b39a4fc518033e
-
SHA256
499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d
-
SHA512
acda0a70b2e6aac1b0f4e1f7d8b1abdc1fa0b8851eeb72ab5bb95c7101397281c2ba97e84f5b807d6b02fde85b6c57b5aa43180e5f56e8ec8f3f1895898e6bcc
-
SSDEEP
6144:IVuC+LyMaZgCI7/aQ/fdHn1VJlk0kELSuO2KJK8amQy1CrxQqD9RSaSz+8O5ZH:SFpm7bakHb4lt24K8iy18xQqpx8O5Z
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exedescription pid process target process PID 5048 wrote to memory of 1288 5048 499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe 499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe PID 5048 wrote to memory of 1288 5048 499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe 499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe PID 5048 wrote to memory of 1288 5048 499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe 499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe PID 5048 wrote to memory of 1436 5048 499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe 499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe PID 5048 wrote to memory of 1436 5048 499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe 499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe PID 5048 wrote to memory of 1436 5048 499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe 499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe"C:\Users\Admin\AppData\Local\Temp\499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exestart2⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exewatch2⤵PID:1436