Analysis
-
max time kernel
180s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
b040525bf8044bed95ca450edff85a5d76c7e2eee1be8c33968f87384ecd7a9a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b040525bf8044bed95ca450edff85a5d76c7e2eee1be8c33968f87384ecd7a9a.exe
Resource
win10v2004-20221111-en
General
-
Target
b040525bf8044bed95ca450edff85a5d76c7e2eee1be8c33968f87384ecd7a9a.exe
-
Size
63KB
-
MD5
388d6911de5b648ad418e13b2a7751e5
-
SHA1
06eba51284d7aef6b5fd792fdd4c41c59935c80e
-
SHA256
b040525bf8044bed95ca450edff85a5d76c7e2eee1be8c33968f87384ecd7a9a
-
SHA512
552362cc8eabeca1027b021a924b827f648f885bfdc6783055d23188e4c9ec660a91cfd44fd19bac56ead3522ecbce111ae2828fc5f5a7b31d03f97db556ca60
-
SSDEEP
1536:Zy/Caq2YPhIH+Gogh6KX9F0mxFr0VixO4aryKgvVTskg:Fa4h7Goghly8paDGW
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 32 wrote to memory of 2188 32 b040525bf8044bed95ca450edff85a5d76c7e2eee1be8c33968f87384ecd7a9a.exe 82 PID 32 wrote to memory of 2188 32 b040525bf8044bed95ca450edff85a5d76c7e2eee1be8c33968f87384ecd7a9a.exe 82 PID 32 wrote to memory of 2188 32 b040525bf8044bed95ca450edff85a5d76c7e2eee1be8c33968f87384ecd7a9a.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\b040525bf8044bed95ca450edff85a5d76c7e2eee1be8c33968f87384ecd7a9a.exe"C:\Users\Admin\AppData\Local\Temp\b040525bf8044bed95ca450edff85a5d76c7e2eee1be8c33968f87384ecd7a9a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Users\Admin\AppData\Local\Temp\b040525bf8044bed95ca450edff85a5d76c7e2eee1be8c33968f87384ecd7a9a.exeC:\Users\Admin\AppData\Local\Temp\b040525bf8044bed9" 482⤵PID:2188
-