Analysis
-
max time kernel
93s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 21:39
Static task
static1
Behavioral task
behavioral1
Sample
2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exe
Resource
win10v2004-20220812-en
General
-
Target
2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exe
-
Size
487KB
-
MD5
01ba33a286c7dd6dd77850215da5d496
-
SHA1
90b9a46052e4ebb000ee159cbeb76c99efb87187
-
SHA256
2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b
-
SHA512
2e42f31dd40c6f05d9f3e1478e3903162d0e05e92ab0b23d303b9bef02aea4a0b9315b0a7cb916d9f7e275e554e8f587868b4d444107f787cdf9c2dc413693a4
-
SSDEEP
6144:x9hFBVwCRMnHeym4EG9o1Le199srRE1rAz83c+R4vtio4M99Dv3iQAgUPuy9mnve:4Cqnr6E9/FjLqAoj99byQAgPyE
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3996 wrote to memory of 3292 3996 2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exe 79 PID 3996 wrote to memory of 3292 3996 2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exe 79 PID 3996 wrote to memory of 3292 3996 2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exe 79 PID 3996 wrote to memory of 4880 3996 2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exe 80 PID 3996 wrote to memory of 4880 3996 2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exe 80 PID 3996 wrote to memory of 4880 3996 2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exe"C:\Users\Admin\AppData\Local\Temp\2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exestart2⤵PID:3292
-
-
C:\Users\Admin\AppData\Local\Temp\2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exewatch2⤵PID:4880
-