Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 07:43
Static task
static1
Behavioral task
behavioral1
Sample
6f1856c28b008b64b2c2d909f6169fbfefe09515c9163da4ae4eea0a57d0de95.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6f1856c28b008b64b2c2d909f6169fbfefe09515c9163da4ae4eea0a57d0de95.exe
Resource
win10v2004-20220812-en
General
-
Target
6f1856c28b008b64b2c2d909f6169fbfefe09515c9163da4ae4eea0a57d0de95.exe
-
Size
522KB
-
MD5
10710403cf44c952bf543a0254316761
-
SHA1
45b8a0f95e5d42163915f425e11163b79089e823
-
SHA256
6f1856c28b008b64b2c2d909f6169fbfefe09515c9163da4ae4eea0a57d0de95
-
SHA512
336be23796e409e875a603725a26a9aaa28e555234cfcee816193842939a2897f54dbe2123037f9e72ae9838e8f376fd9766a8d1d409d6760852bff080bc5c77
-
SSDEEP
6144:ftnl17pA3MoPPjovUgzJckVpkNcaC6SJYyQai9oiRCEBCdjGmQy1CrxQqD9RSaSq:d3Lzy2pbJC3RD1y18xQqpx8O54
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2112 wrote to memory of 4804 2112 6f1856c28b008b64b2c2d909f6169fbfefe09515c9163da4ae4eea0a57d0de95.exe 80 PID 2112 wrote to memory of 4804 2112 6f1856c28b008b64b2c2d909f6169fbfefe09515c9163da4ae4eea0a57d0de95.exe 80 PID 2112 wrote to memory of 4804 2112 6f1856c28b008b64b2c2d909f6169fbfefe09515c9163da4ae4eea0a57d0de95.exe 80 PID 2112 wrote to memory of 3440 2112 6f1856c28b008b64b2c2d909f6169fbfefe09515c9163da4ae4eea0a57d0de95.exe 81 PID 2112 wrote to memory of 3440 2112 6f1856c28b008b64b2c2d909f6169fbfefe09515c9163da4ae4eea0a57d0de95.exe 81 PID 2112 wrote to memory of 3440 2112 6f1856c28b008b64b2c2d909f6169fbfefe09515c9163da4ae4eea0a57d0de95.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f1856c28b008b64b2c2d909f6169fbfefe09515c9163da4ae4eea0a57d0de95.exe"C:\Users\Admin\AppData\Local\Temp\6f1856c28b008b64b2c2d909f6169fbfefe09515c9163da4ae4eea0a57d0de95.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\6f1856c28b008b64b2c2d909f6169fbfefe09515c9163da4ae4eea0a57d0de95.exestart2⤵PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\6f1856c28b008b64b2c2d909f6169fbfefe09515c9163da4ae4eea0a57d0de95.exewatch2⤵PID:3440
-