Analysis
-
max time kernel
294s -
max time network
344s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
4a10884468cffd53d29f60055c6f4bcf9659cf4a17c3ef6bd0bc59830a845d94.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4a10884468cffd53d29f60055c6f4bcf9659cf4a17c3ef6bd0bc59830a845d94.exe
Resource
win10v2004-20221111-en
General
-
Target
4a10884468cffd53d29f60055c6f4bcf9659cf4a17c3ef6bd0bc59830a845d94.exe
-
Size
75KB
-
MD5
451ef8861af036307666c4c6e570593d
-
SHA1
e1250c5bae71e4abdbdb48e40915364c8eb50197
-
SHA256
4a10884468cffd53d29f60055c6f4bcf9659cf4a17c3ef6bd0bc59830a845d94
-
SHA512
73d3155d905d5cba5ff5da81b83e68fd21ed31c925275ec931d703bf9d0e7cfafd2d36bd469bb024b67c6080e7120b2e89aa740119508967c138fbd9fdc991d8
-
SSDEEP
1536:Oj8d0iHjiifOBqvUlEhHJ+dNEGm6DjIAJBV3L+lfDTw:Oj8d0AiifO+hHJ+DEGm6ooBkw
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1932 wrote to memory of 4768 1932 4a10884468cffd53d29f60055c6f4bcf9659cf4a17c3ef6bd0bc59830a845d94.exe 81 PID 1932 wrote to memory of 4768 1932 4a10884468cffd53d29f60055c6f4bcf9659cf4a17c3ef6bd0bc59830a845d94.exe 81 PID 1932 wrote to memory of 4768 1932 4a10884468cffd53d29f60055c6f4bcf9659cf4a17c3ef6bd0bc59830a845d94.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a10884468cffd53d29f60055c6f4bcf9659cf4a17c3ef6bd0bc59830a845d94.exe"C:\Users\Admin\AppData\Local\Temp\4a10884468cffd53d29f60055c6f4bcf9659cf4a17c3ef6bd0bc59830a845d94.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\4a10884468cffd53d29f60055c6f4bcf9659cf4a17c3ef6bd0bc59830a845d94.exe?2⤵PID:4768
-