Analysis
-
max time kernel
146s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exe
Resource
win10v2004-20220812-en
General
-
Target
e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exe
-
Size
458KB
-
MD5
0598f46a672ff04c438013b576a59dcd
-
SHA1
9aa1bb90580d9370f40845ee605a03ab8ec07b8b
-
SHA256
e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5
-
SHA512
fd69a98844d48c91e16ddeed400cddd3300abf06e24503a3826526d8c1ac4469899b4db4ee96a12b073366bebc8959dbccc95edbb242007de74fe4603cba61d5
-
SSDEEP
12288:2cBgCNvQoIUKEa0MxlBuhkYOJHZgZ12xENpZNe:xgCNvl15MxehzO7hUZe
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 620 wrote to memory of 4560 620 e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exe 81 PID 620 wrote to memory of 4560 620 e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exe 81 PID 620 wrote to memory of 4560 620 e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exe 81 PID 620 wrote to memory of 4352 620 e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exe 82 PID 620 wrote to memory of 4352 620 e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exe 82 PID 620 wrote to memory of 4352 620 e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exe"C:\Users\Admin\AppData\Local\Temp\e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exestart2⤵PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exewatch2⤵PID:4352
-