Analysis
-
max time kernel
132s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
2441d99932f78841c88b11f4b5a8cd76607b5a4e97dafc2b08190218f07006f6.exe
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2441d99932f78841c88b11f4b5a8cd76607b5a4e97dafc2b08190218f07006f6.exe
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
2441d99932f78841c88b11f4b5a8cd76607b5a4e97dafc2b08190218f07006f6.exe
-
Size
519KB
-
MD5
54dce34bf109d76457a27ca07ef1ca49
-
SHA1
43383c8b968ba1fd6f569daa20cef1d1cfe73ae1
-
SHA256
2441d99932f78841c88b11f4b5a8cd76607b5a4e97dafc2b08190218f07006f6
-
SHA512
577d13e740ddb7364d953d18bb702f2fd0c52479e68d686d0519e41362d9152167d93e97fadad71598bfe0672b20ae9f74973ca3b02b3de73f855d188a244024
-
SSDEEP
12288:c9RA5z0Y40Gyu1ATn/4ozmIqO54YXpJP:Uq5lfRTn/1YMVpJP
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 952 wrote to memory of 3308 952 2441d99932f78841c88b11f4b5a8cd76607b5a4e97dafc2b08190218f07006f6.exe 82 PID 952 wrote to memory of 3308 952 2441d99932f78841c88b11f4b5a8cd76607b5a4e97dafc2b08190218f07006f6.exe 82 PID 952 wrote to memory of 3308 952 2441d99932f78841c88b11f4b5a8cd76607b5a4e97dafc2b08190218f07006f6.exe 82 PID 952 wrote to memory of 4792 952 2441d99932f78841c88b11f4b5a8cd76607b5a4e97dafc2b08190218f07006f6.exe 83 PID 952 wrote to memory of 4792 952 2441d99932f78841c88b11f4b5a8cd76607b5a4e97dafc2b08190218f07006f6.exe 83 PID 952 wrote to memory of 4792 952 2441d99932f78841c88b11f4b5a8cd76607b5a4e97dafc2b08190218f07006f6.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2441d99932f78841c88b11f4b5a8cd76607b5a4e97dafc2b08190218f07006f6.exe"C:\Users\Admin\AppData\Local\Temp\2441d99932f78841c88b11f4b5a8cd76607b5a4e97dafc2b08190218f07006f6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\2441d99932f78841c88b11f4b5a8cd76607b5a4e97dafc2b08190218f07006f6.exestart2⤵PID:3308
-
-
C:\Users\Admin\AppData\Local\Temp\2441d99932f78841c88b11f4b5a8cd76607b5a4e97dafc2b08190218f07006f6.exewatch2⤵PID:4792
-