Analysis
-
max time kernel
217s -
max time network
222s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exe
Resource
win10v2004-20220812-en
General
-
Target
23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exe
-
Size
525KB
-
MD5
cb90f9a5283294794566c744c4aea7cb
-
SHA1
750dbedafd4c75780c0e89ce4e9c742dde882e33
-
SHA256
23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd
-
SHA512
db48503f70b95d614c06b778af768182414d145566f84d947c2f927feb40086b9cc4897b4d834996168ad5d95d07b0e0acffcb26bf0b43f6ebd2476fce99e249
-
SSDEEP
12288:92Z5rDp5wICuTYeqFRgJX9ZalqiV8YG670R:C5rD37YemaslqiV9G0e
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3444 wrote to memory of 4272 3444 23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exe 82 PID 3444 wrote to memory of 4272 3444 23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exe 82 PID 3444 wrote to memory of 4272 3444 23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exe 82 PID 3444 wrote to memory of 1176 3444 23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exe 81 PID 3444 wrote to memory of 1176 3444 23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exe 81 PID 3444 wrote to memory of 1176 3444 23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exe"C:\Users\Admin\AppData\Local\Temp\23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exewatch2⤵PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exestart2⤵PID:4272
-