Analysis
-
max time kernel
173s -
max time network
215s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 07:46
Static task
static1
Behavioral task
behavioral1
Sample
4e0075d0d851fe03a3d135417d8183eb54f834338d5969d31f23d85c981277b0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4e0075d0d851fe03a3d135417d8183eb54f834338d5969d31f23d85c981277b0.exe
Resource
win10v2004-20221111-en
General
-
Target
4e0075d0d851fe03a3d135417d8183eb54f834338d5969d31f23d85c981277b0.exe
-
Size
526KB
-
MD5
d695765cbee2d94379d0d1d12706362d
-
SHA1
ebada447e35efb387182eded9498de1163006524
-
SHA256
4e0075d0d851fe03a3d135417d8183eb54f834338d5969d31f23d85c981277b0
-
SHA512
3da8f5cbf4ed9731eaa557b510fc14501689f89bf223ae264b71f2a524afb904413c438f96f798fb9a0071763646b7cb688b4cabdef2f73f610b48f3faf7fac3
-
SSDEEP
6144:80idPOn3kQbCntxCFFywoYA2ZfgLXtsFtwP+bcyZmQy1CrxQqD9RSaSz+8O5Bau:piMDbcAFywf9ZAIry18xQqpx8O5BV
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3640 wrote to memory of 3520 3640 4e0075d0d851fe03a3d135417d8183eb54f834338d5969d31f23d85c981277b0.exe 82 PID 3640 wrote to memory of 3520 3640 4e0075d0d851fe03a3d135417d8183eb54f834338d5969d31f23d85c981277b0.exe 82 PID 3640 wrote to memory of 3520 3640 4e0075d0d851fe03a3d135417d8183eb54f834338d5969d31f23d85c981277b0.exe 82 PID 3640 wrote to memory of 1480 3640 4e0075d0d851fe03a3d135417d8183eb54f834338d5969d31f23d85c981277b0.exe 83 PID 3640 wrote to memory of 1480 3640 4e0075d0d851fe03a3d135417d8183eb54f834338d5969d31f23d85c981277b0.exe 83 PID 3640 wrote to memory of 1480 3640 4e0075d0d851fe03a3d135417d8183eb54f834338d5969d31f23d85c981277b0.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e0075d0d851fe03a3d135417d8183eb54f834338d5969d31f23d85c981277b0.exe"C:\Users\Admin\AppData\Local\Temp\4e0075d0d851fe03a3d135417d8183eb54f834338d5969d31f23d85c981277b0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\4e0075d0d851fe03a3d135417d8183eb54f834338d5969d31f23d85c981277b0.exestart2⤵PID:3520
-
-
C:\Users\Admin\AppData\Local\Temp\4e0075d0d851fe03a3d135417d8183eb54f834338d5969d31f23d85c981277b0.exewatch2⤵PID:1480
-