Analysis
-
max time kernel
159s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 15:04
Static task
static1
Behavioral task
behavioral1
Sample
c0d7e0b38d560529ce61b73f799b9a8f4d62f48a717eb2d53393693fea15a717.exe
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c0d7e0b38d560529ce61b73f799b9a8f4d62f48a717eb2d53393693fea15a717.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
c0d7e0b38d560529ce61b73f799b9a8f4d62f48a717eb2d53393693fea15a717.exe
-
Size
507KB
-
MD5
fbb2020eab1a5fb0e6bb081e889631bd
-
SHA1
8d6be586fcafb409b1d84d6bb4c85953ea09ed2a
-
SHA256
c0d7e0b38d560529ce61b73f799b9a8f4d62f48a717eb2d53393693fea15a717
-
SHA512
7134cd7bb5d4102f10fe9986d1186013ee0389f549c1e7689c8cfff721b27213152645617ca0d6211200b3890708780d18f6df1e5fce50a1de7afb2357e8d507
-
SSDEEP
12288:oLoysPR9vqXRih4ExbbeZ8kf3MAz450VW:oL0rARihdJKbcAWn
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2628 2168 c0d7e0b38d560529ce61b73f799b9a8f4d62f48a717eb2d53393693fea15a717.exe 85 PID 2168 wrote to memory of 2628 2168 c0d7e0b38d560529ce61b73f799b9a8f4d62f48a717eb2d53393693fea15a717.exe 85 PID 2168 wrote to memory of 2628 2168 c0d7e0b38d560529ce61b73f799b9a8f4d62f48a717eb2d53393693fea15a717.exe 85 PID 2168 wrote to memory of 4336 2168 c0d7e0b38d560529ce61b73f799b9a8f4d62f48a717eb2d53393693fea15a717.exe 86 PID 2168 wrote to memory of 4336 2168 c0d7e0b38d560529ce61b73f799b9a8f4d62f48a717eb2d53393693fea15a717.exe 86 PID 2168 wrote to memory of 4336 2168 c0d7e0b38d560529ce61b73f799b9a8f4d62f48a717eb2d53393693fea15a717.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0d7e0b38d560529ce61b73f799b9a8f4d62f48a717eb2d53393693fea15a717.exe"C:\Users\Admin\AppData\Local\Temp\c0d7e0b38d560529ce61b73f799b9a8f4d62f48a717eb2d53393693fea15a717.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\c0d7e0b38d560529ce61b73f799b9a8f4d62f48a717eb2d53393693fea15a717.exestart2⤵PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\c0d7e0b38d560529ce61b73f799b9a8f4d62f48a717eb2d53393693fea15a717.exewatch2⤵PID:4336
-