Analysis
-
max time kernel
175s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 04:25
Static task
static1
Behavioral task
behavioral1
Sample
e6ac0bd7546e9be04465eb7c459c880746f717306ff8e4b59676ea0ff38a9663.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e6ac0bd7546e9be04465eb7c459c880746f717306ff8e4b59676ea0ff38a9663.exe
Resource
win10v2004-20221111-en
General
-
Target
e6ac0bd7546e9be04465eb7c459c880746f717306ff8e4b59676ea0ff38a9663.exe
-
Size
507KB
-
MD5
f6ec92a75b54b68ba63c757dbe703a9b
-
SHA1
22f61c7f489a34b3572c9009f727e3600264bd0a
-
SHA256
e6ac0bd7546e9be04465eb7c459c880746f717306ff8e4b59676ea0ff38a9663
-
SHA512
0e07d5fe7c39b4a0c3a323bfadb1f8e0699f7f5c5ece7e46fecc528a55af9dd37ecbc1a387022fcf871bb38fedd43b5a48301f34e0607ad153987b3846016f5e
-
SSDEEP
6144:qiiYr0nmiUwSizTnNLd0Rucic8XZla6eFGTjhXf5JPAllCzIcN5fcFkJrtvWZe:Yo0gildN9c8ybEDd2cz4QvW
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3008 wrote to memory of 1048 3008 e6ac0bd7546e9be04465eb7c459c880746f717306ff8e4b59676ea0ff38a9663.exe 85 PID 3008 wrote to memory of 1048 3008 e6ac0bd7546e9be04465eb7c459c880746f717306ff8e4b59676ea0ff38a9663.exe 85 PID 3008 wrote to memory of 1048 3008 e6ac0bd7546e9be04465eb7c459c880746f717306ff8e4b59676ea0ff38a9663.exe 85 PID 3008 wrote to memory of 260 3008 e6ac0bd7546e9be04465eb7c459c880746f717306ff8e4b59676ea0ff38a9663.exe 84 PID 3008 wrote to memory of 260 3008 e6ac0bd7546e9be04465eb7c459c880746f717306ff8e4b59676ea0ff38a9663.exe 84 PID 3008 wrote to memory of 260 3008 e6ac0bd7546e9be04465eb7c459c880746f717306ff8e4b59676ea0ff38a9663.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6ac0bd7546e9be04465eb7c459c880746f717306ff8e4b59676ea0ff38a9663.exe"C:\Users\Admin\AppData\Local\Temp\e6ac0bd7546e9be04465eb7c459c880746f717306ff8e4b59676ea0ff38a9663.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\e6ac0bd7546e9be04465eb7c459c880746f717306ff8e4b59676ea0ff38a9663.exewatch2⤵PID:260
-
-
C:\Users\Admin\AppData\Local\Temp\e6ac0bd7546e9be04465eb7c459c880746f717306ff8e4b59676ea0ff38a9663.exestart2⤵PID:1048
-