Analysis
-
max time kernel
186s -
max time network
221s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
f3bc08baf0ef2ad175d73f6a372703a7abd7f0b2bce04f42316873cf1d9cbb63.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f3bc08baf0ef2ad175d73f6a372703a7abd7f0b2bce04f42316873cf1d9cbb63.exe
Resource
win10v2004-20221111-en
General
-
Target
f3bc08baf0ef2ad175d73f6a372703a7abd7f0b2bce04f42316873cf1d9cbb63.exe
-
Size
507KB
-
MD5
0303951fb3e07ce5bc2560af5551021f
-
SHA1
9c729685056ee388ff16885133d93c8088508814
-
SHA256
f3bc08baf0ef2ad175d73f6a372703a7abd7f0b2bce04f42316873cf1d9cbb63
-
SHA512
94e665668a5b507bb765c7cf5115069ac86800969b8bc12060c7424ad12b70b03b2259680d18369c65e41dfeedaad760785d27e4467baca97ae9ab32890597fa
-
SSDEEP
6144:vah1fUZ0lfYOCy8+1z9z5sFBbWGaUVwYWTXP/zEXU8qd5Zx2+ZCzIcN5fcFkJrsz:ibBlgG8Sk+gVwjf/hYz4F2W
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3068 wrote to memory of 4060 3068 f3bc08baf0ef2ad175d73f6a372703a7abd7f0b2bce04f42316873cf1d9cbb63.exe 82 PID 3068 wrote to memory of 4060 3068 f3bc08baf0ef2ad175d73f6a372703a7abd7f0b2bce04f42316873cf1d9cbb63.exe 82 PID 3068 wrote to memory of 4060 3068 f3bc08baf0ef2ad175d73f6a372703a7abd7f0b2bce04f42316873cf1d9cbb63.exe 82 PID 3068 wrote to memory of 3296 3068 f3bc08baf0ef2ad175d73f6a372703a7abd7f0b2bce04f42316873cf1d9cbb63.exe 83 PID 3068 wrote to memory of 3296 3068 f3bc08baf0ef2ad175d73f6a372703a7abd7f0b2bce04f42316873cf1d9cbb63.exe 83 PID 3068 wrote to memory of 3296 3068 f3bc08baf0ef2ad175d73f6a372703a7abd7f0b2bce04f42316873cf1d9cbb63.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3bc08baf0ef2ad175d73f6a372703a7abd7f0b2bce04f42316873cf1d9cbb63.exe"C:\Users\Admin\AppData\Local\Temp\f3bc08baf0ef2ad175d73f6a372703a7abd7f0b2bce04f42316873cf1d9cbb63.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\f3bc08baf0ef2ad175d73f6a372703a7abd7f0b2bce04f42316873cf1d9cbb63.exestart2⤵PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\f3bc08baf0ef2ad175d73f6a372703a7abd7f0b2bce04f42316873cf1d9cbb63.exewatch2⤵PID:3296
-