Analysis
-
max time kernel
67s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
5b70a10e3ea0878887e4f8b46f1b72444927c2f75a6d178d8a98649cc1f330a5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5b70a10e3ea0878887e4f8b46f1b72444927c2f75a6d178d8a98649cc1f330a5.exe
Resource
win10v2004-20220812-en
General
-
Target
5b70a10e3ea0878887e4f8b46f1b72444927c2f75a6d178d8a98649cc1f330a5.exe
-
Size
529KB
-
MD5
6d54ac560d0fc27924efb937a1781fa2
-
SHA1
53423518720aa186a5a7eab23ac6c04331d54d9a
-
SHA256
5b70a10e3ea0878887e4f8b46f1b72444927c2f75a6d178d8a98649cc1f330a5
-
SHA512
8033be8ec9e96f3aa74e6aae26f69ba265e4f34b975f873a5458e8d024b10c3ba6fe97ff755b62e2da3e3d74135b8a15d141424062b48322e5cf2bde2ffc3f5a
-
SSDEEP
6144:v2ZIuN4LcgDTBmn5d12PpJDH9jxkh5IZWfOTW/5frB6M8tZdxivBI0EUIP6raP8M:v2ZG1DGrqLHZqcVa5f2Pu6V0Gr
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2032 wrote to memory of 4332 2032 5b70a10e3ea0878887e4f8b46f1b72444927c2f75a6d178d8a98649cc1f330a5.exe 81 PID 2032 wrote to memory of 4332 2032 5b70a10e3ea0878887e4f8b46f1b72444927c2f75a6d178d8a98649cc1f330a5.exe 81 PID 2032 wrote to memory of 4332 2032 5b70a10e3ea0878887e4f8b46f1b72444927c2f75a6d178d8a98649cc1f330a5.exe 81 PID 2032 wrote to memory of 1300 2032 5b70a10e3ea0878887e4f8b46f1b72444927c2f75a6d178d8a98649cc1f330a5.exe 82 PID 2032 wrote to memory of 1300 2032 5b70a10e3ea0878887e4f8b46f1b72444927c2f75a6d178d8a98649cc1f330a5.exe 82 PID 2032 wrote to memory of 1300 2032 5b70a10e3ea0878887e4f8b46f1b72444927c2f75a6d178d8a98649cc1f330a5.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b70a10e3ea0878887e4f8b46f1b72444927c2f75a6d178d8a98649cc1f330a5.exe"C:\Users\Admin\AppData\Local\Temp\5b70a10e3ea0878887e4f8b46f1b72444927c2f75a6d178d8a98649cc1f330a5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\5b70a10e3ea0878887e4f8b46f1b72444927c2f75a6d178d8a98649cc1f330a5.exestart2⤵PID:4332
-
-
C:\Users\Admin\AppData\Local\Temp\5b70a10e3ea0878887e4f8b46f1b72444927c2f75a6d178d8a98649cc1f330a5.exewatch2⤵PID:1300
-