Analysis
-
max time kernel
161s -
max time network
215s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 16:47
Static task
static1
Behavioral task
behavioral1
Sample
0367397469dbcb588d7fbf7e2649a7681584351033b2acd81a5b6bcfa320a90f.exe
Resource
win7-20221111-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
0367397469dbcb588d7fbf7e2649a7681584351033b2acd81a5b6bcfa320a90f.exe
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
0367397469dbcb588d7fbf7e2649a7681584351033b2acd81a5b6bcfa320a90f.exe
-
Size
505KB
-
MD5
fededbe8225bc25f07cd80cf8cbff7df
-
SHA1
9b53c4990cb574ef3ac90e45620a47399a762d1b
-
SHA256
0367397469dbcb588d7fbf7e2649a7681584351033b2acd81a5b6bcfa320a90f
-
SHA512
a8e678321e57e1f432f438f00fdf9c42b74444b7357adcf7feceefc72151130360149be8f65b915184d448abe08d5ec26f7f9c1433e38457dbeb294b4cc3a325
-
SSDEEP
12288:3kfVHVzL+mv0677dOSRu+PV55y/fB8tgr:3kfTvB867Rr5gwi
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4288 wrote to memory of 4120 4288 0367397469dbcb588d7fbf7e2649a7681584351033b2acd81a5b6bcfa320a90f.exe 78 PID 4288 wrote to memory of 4120 4288 0367397469dbcb588d7fbf7e2649a7681584351033b2acd81a5b6bcfa320a90f.exe 78 PID 4288 wrote to memory of 4120 4288 0367397469dbcb588d7fbf7e2649a7681584351033b2acd81a5b6bcfa320a90f.exe 78 PID 4288 wrote to memory of 4140 4288 0367397469dbcb588d7fbf7e2649a7681584351033b2acd81a5b6bcfa320a90f.exe 79 PID 4288 wrote to memory of 4140 4288 0367397469dbcb588d7fbf7e2649a7681584351033b2acd81a5b6bcfa320a90f.exe 79 PID 4288 wrote to memory of 4140 4288 0367397469dbcb588d7fbf7e2649a7681584351033b2acd81a5b6bcfa320a90f.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\0367397469dbcb588d7fbf7e2649a7681584351033b2acd81a5b6bcfa320a90f.exe"C:\Users\Admin\AppData\Local\Temp\0367397469dbcb588d7fbf7e2649a7681584351033b2acd81a5b6bcfa320a90f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\0367397469dbcb588d7fbf7e2649a7681584351033b2acd81a5b6bcfa320a90f.exestart2⤵PID:4120
-
-
C:\Users\Admin\AppData\Local\Temp\0367397469dbcb588d7fbf7e2649a7681584351033b2acd81a5b6bcfa320a90f.exewatch2⤵PID:4140
-