Analysis
-
max time kernel
332s -
max time network
401s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 12:43
Static task
static1
Behavioral task
behavioral1
Sample
ea62a98712b5de40f6397c7c29f8a0143a18de6e3251602843a2bd868c5e8491.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea62a98712b5de40f6397c7c29f8a0143a18de6e3251602843a2bd868c5e8491.exe
Resource
win10v2004-20221111-en
General
-
Target
ea62a98712b5de40f6397c7c29f8a0143a18de6e3251602843a2bd868c5e8491.exe
-
Size
42KB
-
MD5
b972f7a67c2daca798879994f28b9933
-
SHA1
763edcfb9d86acf25b315fa41bf618d990b49071
-
SHA256
ea62a98712b5de40f6397c7c29f8a0143a18de6e3251602843a2bd868c5e8491
-
SHA512
50e0b9a66b7a9596b0f094d6bd2021bd22ea4386781431d82926a0bcabbd66f2ffc3f9dc35ebd97a0fbb4430c2c9609d1a17fdd1201f1460062a4810e158d8f8
-
SSDEEP
768:n/x+ZFc7ib+49tiBdJhoww8cyR+b3RruS9ADEPHi:n/0Dce+4D6dkMcA+9rnWDEPHi
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4156 wrote to memory of 3240 4156 ea62a98712b5de40f6397c7c29f8a0143a18de6e3251602843a2bd868c5e8491.exe 80 PID 4156 wrote to memory of 3240 4156 ea62a98712b5de40f6397c7c29f8a0143a18de6e3251602843a2bd868c5e8491.exe 80 PID 4156 wrote to memory of 3240 4156 ea62a98712b5de40f6397c7c29f8a0143a18de6e3251602843a2bd868c5e8491.exe 80 PID 4156 wrote to memory of 3240 4156 ea62a98712b5de40f6397c7c29f8a0143a18de6e3251602843a2bd868c5e8491.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea62a98712b5de40f6397c7c29f8a0143a18de6e3251602843a2bd868c5e8491.exe"C:\Users\Admin\AppData\Local\Temp\ea62a98712b5de40f6397c7c29f8a0143a18de6e3251602843a2bd868c5e8491.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" %12⤵PID:3240
-