Analysis
-
max time kernel
160s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 12:14
Static task
static1
Behavioral task
behavioral1
Sample
700bda060a00cd766b3e044559213d1ddab1d119058107fab178bc54d851a8b1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
700bda060a00cd766b3e044559213d1ddab1d119058107fab178bc54d851a8b1.exe
Resource
win10v2004-20221111-en
General
-
Target
700bda060a00cd766b3e044559213d1ddab1d119058107fab178bc54d851a8b1.exe
-
Size
515KB
-
MD5
c045e4cad17a8629a3028a32c8ae07e9
-
SHA1
942bc50aa13cae6620f3807148a3d23d71121b5c
-
SHA256
700bda060a00cd766b3e044559213d1ddab1d119058107fab178bc54d851a8b1
-
SHA512
34c3126bb2e5513d8235fe4006855055065e820e0b7122e961e481ef753758260c9343acc11b1a7c7167508d00d2188894ea3d12cb8b6e0719258c7526da45e9
-
SSDEEP
6144:j9gtoDyD9Ag9rIywgibXtoKLveqvr9SMI0LvJcz4XiOVOvli8xfDyND6KcaJOa8x:GRAXb7toKLvbXXlPQwDR2z
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4744 wrote to memory of 3472 4744 700bda060a00cd766b3e044559213d1ddab1d119058107fab178bc54d851a8b1.exe 86 PID 4744 wrote to memory of 3472 4744 700bda060a00cd766b3e044559213d1ddab1d119058107fab178bc54d851a8b1.exe 86 PID 4744 wrote to memory of 3472 4744 700bda060a00cd766b3e044559213d1ddab1d119058107fab178bc54d851a8b1.exe 86 PID 4744 wrote to memory of 4460 4744 700bda060a00cd766b3e044559213d1ddab1d119058107fab178bc54d851a8b1.exe 85 PID 4744 wrote to memory of 4460 4744 700bda060a00cd766b3e044559213d1ddab1d119058107fab178bc54d851a8b1.exe 85 PID 4744 wrote to memory of 4460 4744 700bda060a00cd766b3e044559213d1ddab1d119058107fab178bc54d851a8b1.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\700bda060a00cd766b3e044559213d1ddab1d119058107fab178bc54d851a8b1.exe"C:\Users\Admin\AppData\Local\Temp\700bda060a00cd766b3e044559213d1ddab1d119058107fab178bc54d851a8b1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\700bda060a00cd766b3e044559213d1ddab1d119058107fab178bc54d851a8b1.exewatch2⤵PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\700bda060a00cd766b3e044559213d1ddab1d119058107fab178bc54d851a8b1.exestart2⤵PID:3472
-