Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 12:11
Static task
static1
Behavioral task
behavioral1
Sample
9de1833a17dce82fb3d4a323186f5f10a87aa229a705b9e98852ae6d3336aa4a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9de1833a17dce82fb3d4a323186f5f10a87aa229a705b9e98852ae6d3336aa4a.exe
Resource
win10v2004-20220812-en
General
-
Target
9de1833a17dce82fb3d4a323186f5f10a87aa229a705b9e98852ae6d3336aa4a.exe
-
Size
506KB
-
MD5
2bc94ada78e0cec82d0c887a7c5884f2
-
SHA1
30a2bd59eaccacdd803eb490cd5e2449279f8f29
-
SHA256
9de1833a17dce82fb3d4a323186f5f10a87aa229a705b9e98852ae6d3336aa4a
-
SHA512
9b4817f76a345d0e116dea486a1774359182e9ee38c86bfab16068a0ad0b1765092c7d722f330ebc8ab65f8b1b68ed9459c66da37a9fc555e6f8dfb905aadc42
-
SSDEEP
12288:Kyfv2Z3Hp3eKXpNYuS/xvM6mxRmVkGveixbjRs:F2Z3peWpC3xvM6mxakeeixbjRs
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3572 wrote to memory of 1352 3572 9de1833a17dce82fb3d4a323186f5f10a87aa229a705b9e98852ae6d3336aa4a.exe 81 PID 3572 wrote to memory of 1352 3572 9de1833a17dce82fb3d4a323186f5f10a87aa229a705b9e98852ae6d3336aa4a.exe 81 PID 3572 wrote to memory of 1352 3572 9de1833a17dce82fb3d4a323186f5f10a87aa229a705b9e98852ae6d3336aa4a.exe 81 PID 3572 wrote to memory of 2692 3572 9de1833a17dce82fb3d4a323186f5f10a87aa229a705b9e98852ae6d3336aa4a.exe 82 PID 3572 wrote to memory of 2692 3572 9de1833a17dce82fb3d4a323186f5f10a87aa229a705b9e98852ae6d3336aa4a.exe 82 PID 3572 wrote to memory of 2692 3572 9de1833a17dce82fb3d4a323186f5f10a87aa229a705b9e98852ae6d3336aa4a.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\9de1833a17dce82fb3d4a323186f5f10a87aa229a705b9e98852ae6d3336aa4a.exe"C:\Users\Admin\AppData\Local\Temp\9de1833a17dce82fb3d4a323186f5f10a87aa229a705b9e98852ae6d3336aa4a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\9de1833a17dce82fb3d4a323186f5f10a87aa229a705b9e98852ae6d3336aa4a.exestart2⤵PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\9de1833a17dce82fb3d4a323186f5f10a87aa229a705b9e98852ae6d3336aa4a.exewatch2⤵PID:2692
-