Analysis
-
max time kernel
130s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 15:28
Static task
static1
Behavioral task
behavioral1
Sample
ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe
Resource
win10v2004-20220812-en
General
-
Target
ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe
-
Size
54KB
-
MD5
441c8ecb9aedec1ed37d5cfb6db8fc20
-
SHA1
224bfd27a8643f27eb51ddddec2afcbb4add1df1
-
SHA256
ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a
-
SHA512
0aea90c04110d849e853776d7f32b563da0e32ef0bcb91bec75c3ab1eb7c8f2e07b20602aef1422354277ea4881c6d26cb1006370fd767d94aef5c8f6618e7cf
-
SSDEEP
768:t2C0Unxv3HBo42JHVVpIXo+sSADVe61rguZXN8/vM7bkrefb9TqsDYbQ5TM1feJ1:50WA42JHPf+sSAD8GXN+I7fJ+aCl1fez
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55 PID 4804 wrote to memory of 2520 4804 ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe"C:\Users\Admin\AppData\Local\Temp\ad45541b9346debdf19fb4ac572d5a552b9fd13ce570899ce7a39090cc92015a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4804
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:5096