Analysis
-
max time kernel
158s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
c6d58af0fd5d16125db47666982d6ef9b16853d882f9b8ad89070ebcb9a632ec.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c6d58af0fd5d16125db47666982d6ef9b16853d882f9b8ad89070ebcb9a632ec.exe
Resource
win10v2004-20221111-en
General
-
Target
c6d58af0fd5d16125db47666982d6ef9b16853d882f9b8ad89070ebcb9a632ec.exe
-
Size
133KB
-
MD5
5cbd7be72fb622067135ddab93b8b1cd
-
SHA1
832152dafd817193b26866e2ba36b84c93c6d0f2
-
SHA256
c6d58af0fd5d16125db47666982d6ef9b16853d882f9b8ad89070ebcb9a632ec
-
SHA512
953f9cb0d4e3c7968af398c4f713ba077aa80a13d6b711b01d536f19306523cdbc83afab0fb7016cf23f045f2c1f1fd5a996225e96cab19655e99d921a3e7648
-
SSDEEP
3072:dV3pot4+BLxjL0iDDhxXeXifphYSoA0GbhbhioqiUDH/f:H+BBFDOSDY5A0Gbvioq/DH
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4064-134-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4064-138-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4064-137-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4064-140-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4064 c6d58af0fd5d16125db47666982d6ef9b16853d882f9b8ad89070ebcb9a632ec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1848 wrote to memory of 4064 1848 c6d58af0fd5d16125db47666982d6ef9b16853d882f9b8ad89070ebcb9a632ec.exe 82 PID 1848 wrote to memory of 4064 1848 c6d58af0fd5d16125db47666982d6ef9b16853d882f9b8ad89070ebcb9a632ec.exe 82 PID 1848 wrote to memory of 4064 1848 c6d58af0fd5d16125db47666982d6ef9b16853d882f9b8ad89070ebcb9a632ec.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6d58af0fd5d16125db47666982d6ef9b16853d882f9b8ad89070ebcb9a632ec.exe"C:\Users\Admin\AppData\Local\Temp\c6d58af0fd5d16125db47666982d6ef9b16853d882f9b8ad89070ebcb9a632ec.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\c6d58af0fd5d16125db47666982d6ef9b16853d882f9b8ad89070ebcb9a632ec.exe?2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:4064
-