Analysis
-
max time kernel
178s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 07:49
Static task
static1
Behavioral task
behavioral1
Sample
30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe
Resource
win10v2004-20221111-en
General
-
Target
30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe
-
Size
526KB
-
MD5
ea917cbcf88a3e19eee7cc7bc8ccf11e
-
SHA1
daf3712a56bddbdc41b6aeb48d6454e693992a25
-
SHA256
30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc
-
SHA512
2d1d7217dd32479b6d29c3496a98d62c50fbf5a6ee99646c7ffaccb32ad320ec0e0bcbc69984143ebc1e010762c85e4b4cd1b4c1168ef38a8c9ce04c875f11b1
-
SSDEEP
12288:FsXTd4Ir/wk9WeDKKDKS+2My18xQqpx8O5Cj:eyIbwKW2LDKoMatqpx8d
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exedescription pid process target process PID 1444 wrote to memory of 3192 1444 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 1444 wrote to memory of 3192 1444 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 1444 wrote to memory of 3192 1444 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 1444 wrote to memory of 4284 1444 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 1444 wrote to memory of 4284 1444 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 1444 wrote to memory of 4284 1444 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe"C:\Users\Admin\AppData\Local\Temp\30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exestart2⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exewatch2⤵PID:4284