Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 12:11
Static task
static1
Behavioral task
behavioral1
Sample
b875fbae97bae79b72e4d2c547624f0b77327e5c1aa24f58ef7fee933206437c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b875fbae97bae79b72e4d2c547624f0b77327e5c1aa24f58ef7fee933206437c.exe
Resource
win10v2004-20220901-en
General
-
Target
b875fbae97bae79b72e4d2c547624f0b77327e5c1aa24f58ef7fee933206437c.exe
-
Size
481KB
-
MD5
f0eb5309064e9866e3ab4dbb5e352374
-
SHA1
cca1b820cd54f5f024718b9296535c24176f9f18
-
SHA256
b875fbae97bae79b72e4d2c547624f0b77327e5c1aa24f58ef7fee933206437c
-
SHA512
9b7d5c2164800a7a983829125dfa774290cad209e63f5dfb579b4020bc8d27665e34e9c31c546e3c326d43b70b151c23bc41cda438c3d76273bb22630502f15e
-
SSDEEP
6144:i4NQAq49dWyS2WRHv+6R0e/LlQcmt5hJBA4r5qFz7MLZY3/vvffJ0ECMCxL19ftw:bp94ySDRHG6R0eTsDk7HvvR7bCxZal
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3916 wrote to memory of 2068 3916 b875fbae97bae79b72e4d2c547624f0b77327e5c1aa24f58ef7fee933206437c.exe 81 PID 3916 wrote to memory of 2068 3916 b875fbae97bae79b72e4d2c547624f0b77327e5c1aa24f58ef7fee933206437c.exe 81 PID 3916 wrote to memory of 2068 3916 b875fbae97bae79b72e4d2c547624f0b77327e5c1aa24f58ef7fee933206437c.exe 81 PID 3916 wrote to memory of 4492 3916 b875fbae97bae79b72e4d2c547624f0b77327e5c1aa24f58ef7fee933206437c.exe 82 PID 3916 wrote to memory of 4492 3916 b875fbae97bae79b72e4d2c547624f0b77327e5c1aa24f58ef7fee933206437c.exe 82 PID 3916 wrote to memory of 4492 3916 b875fbae97bae79b72e4d2c547624f0b77327e5c1aa24f58ef7fee933206437c.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\b875fbae97bae79b72e4d2c547624f0b77327e5c1aa24f58ef7fee933206437c.exe"C:\Users\Admin\AppData\Local\Temp\b875fbae97bae79b72e4d2c547624f0b77327e5c1aa24f58ef7fee933206437c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\b875fbae97bae79b72e4d2c547624f0b77327e5c1aa24f58ef7fee933206437c.exestart2⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\b875fbae97bae79b72e4d2c547624f0b77327e5c1aa24f58ef7fee933206437c.exewatch2⤵PID:4492
-