Analysis
-
max time kernel
108s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe
Resource
win10v2004-20220812-en
General
-
Target
fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe
-
Size
133KB
-
MD5
f05a9d7fdc01ed0e585b23bd99e5e87a
-
SHA1
612c9d1a08ebec1b7d58469dc1186db378261815
-
SHA256
fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12
-
SHA512
db6f40141aa356bc321adbac3d4d0b80a6192f84de6cedceb1a38b2796db0d2d7a636d117bf78c429a8143968a2f9f4c6aa6606b92970f9b36a29b0f012bfca0
-
SSDEEP
3072:TV3poz5tE5DPvfcLppd6irxoifphYSoA0GbhbhicqiXWc/G:inQbv0tpcSDY5A0Gbvicq9
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1556-136-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/1556-139-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/1556-140-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/1556-141-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1556 2360 fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe 78 PID 2360 wrote to memory of 1556 2360 fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe 78 PID 2360 wrote to memory of 1556 2360 fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe"C:\Users\Admin\AppData\Local\Temp\fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\fda1fbaac4198a29437655570e0d19319d8c8e4814ea562dd97d04555515cc12.exe?2⤵PID:1556
-