Analysis
-
max time kernel
190s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 13:04
Static task
static1
Behavioral task
behavioral1
Sample
22a3e11e799b7a1b450aa9b52b572197121f0ee6dc8d017a0cd635b2e3e11c38.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
22a3e11e799b7a1b450aa9b52b572197121f0ee6dc8d017a0cd635b2e3e11c38.exe
Resource
win10v2004-20221111-en
General
-
Target
22a3e11e799b7a1b450aa9b52b572197121f0ee6dc8d017a0cd635b2e3e11c38.exe
-
Size
61KB
-
MD5
9876b7a36a709351ccaef7fa6f9ef050
-
SHA1
54b1f5d921a8885e610ebc6529f4be4a8505cb0d
-
SHA256
22a3e11e799b7a1b450aa9b52b572197121f0ee6dc8d017a0cd635b2e3e11c38
-
SHA512
262425a6024af1346c83e07f7a715f36738fd5152e29cafbf7983424404663672276eb983c6c1d186b2c252eb2985221dd041ba3c3d0571932721ad3988706e9
-
SSDEEP
1536:15aA1GC6V8kW+mHuYG76S9XtZ+WsZbXiCnCO0VC2vVTskg:mCxRHIV9XtZczn10PW
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3152 wrote to memory of 212 3152 22a3e11e799b7a1b450aa9b52b572197121f0ee6dc8d017a0cd635b2e3e11c38.exe 83 PID 3152 wrote to memory of 212 3152 22a3e11e799b7a1b450aa9b52b572197121f0ee6dc8d017a0cd635b2e3e11c38.exe 83 PID 3152 wrote to memory of 212 3152 22a3e11e799b7a1b450aa9b52b572197121f0ee6dc8d017a0cd635b2e3e11c38.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\22a3e11e799b7a1b450aa9b52b572197121f0ee6dc8d017a0cd635b2e3e11c38.exe"C:\Users\Admin\AppData\Local\Temp\22a3e11e799b7a1b450aa9b52b572197121f0ee6dc8d017a0cd635b2e3e11c38.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\22a3e11e799b7a1b450aa9b52b572197121f0ee6dc8d017a0cd635b2e3e11c38.exeC:\Users\Admin\AppData\Local\Temp\22a3e11e799b7a1b4" 482⤵PID:212
-