Analysis
-
max time kernel
177s -
max time network
212s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
aedb4892963fc058b71778a00dae03d586551b3591a186a119df71408b218796.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aedb4892963fc058b71778a00dae03d586551b3591a186a119df71408b218796.exe
Resource
win10v2004-20221111-en
General
-
Target
aedb4892963fc058b71778a00dae03d586551b3591a186a119df71408b218796.exe
-
Size
520KB
-
MD5
10ae1fdce60cb0876101dee2cf1c3432
-
SHA1
11f5a88c0ccf233d96fb58de32821f94159d1008
-
SHA256
aedb4892963fc058b71778a00dae03d586551b3591a186a119df71408b218796
-
SHA512
cea7df5d189d590e74e23818b0b5385bcf88f155b09f5d9b5313ac901596d606d42552ce44f1d75b0d254b4a35fbd1bb004e35b5f15f85e9d711e8f3648e293b
-
SSDEEP
6144:+8jJrzhoZ0fDerXOYX/Te/edYR+c61cf+M7D6apZRsylIxhOuMJXzePTB5v10oJx:+ycSC9F4D7D6+ZRsUOsXGTn1WOcNG
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3880 wrote to memory of 4680 3880 aedb4892963fc058b71778a00dae03d586551b3591a186a119df71408b218796.exe 83 PID 3880 wrote to memory of 4680 3880 aedb4892963fc058b71778a00dae03d586551b3591a186a119df71408b218796.exe 83 PID 3880 wrote to memory of 4680 3880 aedb4892963fc058b71778a00dae03d586551b3591a186a119df71408b218796.exe 83 PID 3880 wrote to memory of 3224 3880 aedb4892963fc058b71778a00dae03d586551b3591a186a119df71408b218796.exe 84 PID 3880 wrote to memory of 3224 3880 aedb4892963fc058b71778a00dae03d586551b3591a186a119df71408b218796.exe 84 PID 3880 wrote to memory of 3224 3880 aedb4892963fc058b71778a00dae03d586551b3591a186a119df71408b218796.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\aedb4892963fc058b71778a00dae03d586551b3591a186a119df71408b218796.exe"C:\Users\Admin\AppData\Local\Temp\aedb4892963fc058b71778a00dae03d586551b3591a186a119df71408b218796.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\aedb4892963fc058b71778a00dae03d586551b3591a186a119df71408b218796.exestart2⤵PID:4680
-
-
C:\Users\Admin\AppData\Local\Temp\aedb4892963fc058b71778a00dae03d586551b3591a186a119df71408b218796.exewatch2⤵PID:3224
-