Analysis
-
max time kernel
115s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 15:04
Static task
static1
Behavioral task
behavioral1
Sample
c170f660012a328d81a19c3a63587ecf127e0d707932d36d5e5c7f0ece8476e9.exe
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c170f660012a328d81a19c3a63587ecf127e0d707932d36d5e5c7f0ece8476e9.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
c170f660012a328d81a19c3a63587ecf127e0d707932d36d5e5c7f0ece8476e9.exe
-
Size
507KB
-
MD5
b199be19f4d1d903762a2af3afc0adce
-
SHA1
9a0deeafcbb6f18dedf1b1586cd3dda7f6e08303
-
SHA256
c170f660012a328d81a19c3a63587ecf127e0d707932d36d5e5c7f0ece8476e9
-
SHA512
fc8997085f621e212635b5cb23fbd7734a3f4517b7f3cef7cb6ede2a111d4732cd60840cd590e54bd1cd4b696a2bb6f964fe63fd9ed31d0c0bf0347c0ca0f319
-
SSDEEP
12288:/c/KaRv4AGBzhoCCdgQBC4mIr1pz4TyW:/RUvH9dgp4mK1pMX
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5004 wrote to memory of 4716 5004 c170f660012a328d81a19c3a63587ecf127e0d707932d36d5e5c7f0ece8476e9.exe 78 PID 5004 wrote to memory of 4716 5004 c170f660012a328d81a19c3a63587ecf127e0d707932d36d5e5c7f0ece8476e9.exe 78 PID 5004 wrote to memory of 4716 5004 c170f660012a328d81a19c3a63587ecf127e0d707932d36d5e5c7f0ece8476e9.exe 78 PID 5004 wrote to memory of 1852 5004 c170f660012a328d81a19c3a63587ecf127e0d707932d36d5e5c7f0ece8476e9.exe 79 PID 5004 wrote to memory of 1852 5004 c170f660012a328d81a19c3a63587ecf127e0d707932d36d5e5c7f0ece8476e9.exe 79 PID 5004 wrote to memory of 1852 5004 c170f660012a328d81a19c3a63587ecf127e0d707932d36d5e5c7f0ece8476e9.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\c170f660012a328d81a19c3a63587ecf127e0d707932d36d5e5c7f0ece8476e9.exe"C:\Users\Admin\AppData\Local\Temp\c170f660012a328d81a19c3a63587ecf127e0d707932d36d5e5c7f0ece8476e9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\c170f660012a328d81a19c3a63587ecf127e0d707932d36d5e5c7f0ece8476e9.exestart2⤵PID:4716
-
-
C:\Users\Admin\AppData\Local\Temp\c170f660012a328d81a19c3a63587ecf127e0d707932d36d5e5c7f0ece8476e9.exewatch2⤵PID:1852
-