Analysis
-
max time kernel
133s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
4a5307da9900c398576b8433b882a01a2f5ecc147e45c8ebfde396a24d8e2678.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4a5307da9900c398576b8433b882a01a2f5ecc147e45c8ebfde396a24d8e2678.exe
Resource
win10v2004-20220901-en
General
-
Target
4a5307da9900c398576b8433b882a01a2f5ecc147e45c8ebfde396a24d8e2678.exe
-
Size
488KB
-
MD5
4e766b7e36685a655be17aca965ede3f
-
SHA1
68cb21e046d9551c2f67f971e1697bd5bba81228
-
SHA256
4a5307da9900c398576b8433b882a01a2f5ecc147e45c8ebfde396a24d8e2678
-
SHA512
221c0255e625e73944b40df09d53ef1c8ea0cc5be603c42584206f2563b1f79d05bee319fffbac346b05a4892e19c05449a4f17ab36b7b06f5e402927ffdadbf
-
SSDEEP
12288:5mYUP5KQgsWRt5Kp7eoH4E6GtlEeAMpxkR2Dm:5bUP5KQCt8pJ4JGQmDm
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4920 wrote to memory of 3224 4920 4a5307da9900c398576b8433b882a01a2f5ecc147e45c8ebfde396a24d8e2678.exe 87 PID 4920 wrote to memory of 3224 4920 4a5307da9900c398576b8433b882a01a2f5ecc147e45c8ebfde396a24d8e2678.exe 87 PID 4920 wrote to memory of 3224 4920 4a5307da9900c398576b8433b882a01a2f5ecc147e45c8ebfde396a24d8e2678.exe 87 PID 4920 wrote to memory of 4244 4920 4a5307da9900c398576b8433b882a01a2f5ecc147e45c8ebfde396a24d8e2678.exe 88 PID 4920 wrote to memory of 4244 4920 4a5307da9900c398576b8433b882a01a2f5ecc147e45c8ebfde396a24d8e2678.exe 88 PID 4920 wrote to memory of 4244 4920 4a5307da9900c398576b8433b882a01a2f5ecc147e45c8ebfde396a24d8e2678.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a5307da9900c398576b8433b882a01a2f5ecc147e45c8ebfde396a24d8e2678.exe"C:\Users\Admin\AppData\Local\Temp\4a5307da9900c398576b8433b882a01a2f5ecc147e45c8ebfde396a24d8e2678.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\4a5307da9900c398576b8433b882a01a2f5ecc147e45c8ebfde396a24d8e2678.exestart2⤵PID:3224
-
-
C:\Users\Admin\AppData\Local\Temp\4a5307da9900c398576b8433b882a01a2f5ecc147e45c8ebfde396a24d8e2678.exewatch2⤵PID:4244
-