Analysis
-
max time kernel
140s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 07:51
Static task
static1
Behavioral task
behavioral1
Sample
16fc5e89e15000a257df90f929966222bc8a5ba66ebd8d0e36e7d1dae09b9f10.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
16fc5e89e15000a257df90f929966222bc8a5ba66ebd8d0e36e7d1dae09b9f10.exe
Resource
win10v2004-20220812-en
General
-
Target
16fc5e89e15000a257df90f929966222bc8a5ba66ebd8d0e36e7d1dae09b9f10.exe
-
Size
522KB
-
MD5
c0d190e3e5153290cab5a43bfbf5a7ce
-
SHA1
929f9f56729984cc04fbd4e11761dc9111ca48a6
-
SHA256
16fc5e89e15000a257df90f929966222bc8a5ba66ebd8d0e36e7d1dae09b9f10
-
SHA512
6d92b7d339cafe8d130d7eb15e6a9fb088397dfc289161171b6a1cb3c9bf0948bc488a07ea969c2d171597c8b75aad5dfaf334101e82c68b11a1f61dc7bd78cb
-
SSDEEP
6144:zJyZhZqT/goUwz+Y6atoexAZHtyUve5gLOK8fag4mQy1CrxQqD9RSaSz+8O5Zn:leqT/gQOGkeBK8my18xQqpx8O5Z
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 620 wrote to memory of 4936 620 16fc5e89e15000a257df90f929966222bc8a5ba66ebd8d0e36e7d1dae09b9f10.exe 78 PID 620 wrote to memory of 4936 620 16fc5e89e15000a257df90f929966222bc8a5ba66ebd8d0e36e7d1dae09b9f10.exe 78 PID 620 wrote to memory of 4936 620 16fc5e89e15000a257df90f929966222bc8a5ba66ebd8d0e36e7d1dae09b9f10.exe 78 PID 620 wrote to memory of 4856 620 16fc5e89e15000a257df90f929966222bc8a5ba66ebd8d0e36e7d1dae09b9f10.exe 79 PID 620 wrote to memory of 4856 620 16fc5e89e15000a257df90f929966222bc8a5ba66ebd8d0e36e7d1dae09b9f10.exe 79 PID 620 wrote to memory of 4856 620 16fc5e89e15000a257df90f929966222bc8a5ba66ebd8d0e36e7d1dae09b9f10.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\16fc5e89e15000a257df90f929966222bc8a5ba66ebd8d0e36e7d1dae09b9f10.exe"C:\Users\Admin\AppData\Local\Temp\16fc5e89e15000a257df90f929966222bc8a5ba66ebd8d0e36e7d1dae09b9f10.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\16fc5e89e15000a257df90f929966222bc8a5ba66ebd8d0e36e7d1dae09b9f10.exestart2⤵PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\16fc5e89e15000a257df90f929966222bc8a5ba66ebd8d0e36e7d1dae09b9f10.exewatch2⤵PID:4856
-