Analysis
-
max time kernel
162s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 07:44
Static task
static1
Behavioral task
behavioral1
Sample
6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exe
Resource
win10v2004-20221111-en
General
-
Target
6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exe
-
Size
522KB
-
MD5
3934cc008ac672667a8c5107954de1d4
-
SHA1
d9017945190fe60bce922ff6a494a1ffeb44d7b2
-
SHA256
6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4
-
SHA512
b88276d6a33c93be0a6b4cd4db17040446080afc15af78d1294d76dc07ba57fdc0ddd506855f3a9ec2debc677604770a82343c665d192f54ffec92b4317cb696
-
SSDEEP
12288:nI1IahpE2lgEbb+i64y18xQqpx8O5Tbwb6C:7aHTmt4atqpx8kwb
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exedescription pid process target process PID 2588 wrote to memory of 2352 2588 6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exe 6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exe PID 2588 wrote to memory of 2352 2588 6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exe 6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exe PID 2588 wrote to memory of 2352 2588 6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exe 6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exe PID 2588 wrote to memory of 2580 2588 6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exe 6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exe PID 2588 wrote to memory of 2580 2588 6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exe 6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exe PID 2588 wrote to memory of 2580 2588 6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exe 6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exe"C:\Users\Admin\AppData\Local\Temp\6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exestart2⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\6c09f945712622fc62c65555e558cb581c7dae39d5a4d0f0a6bea7d432a5aaa4.exewatch2⤵PID:2580