Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 07:47
Static task
static1
Behavioral task
behavioral1
Sample
d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe
Resource
win10v2004-20220901-en
General
-
Target
d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe
-
Size
133KB
-
MD5
0a7165ada2e5135298ae0d4ca5bf4e45
-
SHA1
9b7f81a4a59bd94f3e8c7f28b5284ad423e6c236
-
SHA256
d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450
-
SHA512
262349e6ba5aa4e6f5816cb7cf46126a419c09ffa27534a1961ddcf835d663647c5785ce6c1762983d64d9bb52ed26d9939cfa8022e425b7db7b77b9c3d4d4f6
-
SSDEEP
3072:9wXjC7Rwp2rDCq4SxRvKTWjn7NTF4ChyXWg/V:WOukvCqLfKTWjhF4Ye
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3112-134-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/3112-137-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/3112-138-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/3112-140-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/3112-141-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1376 wrote to memory of 3112 1376 d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe 81 PID 1376 wrote to memory of 3112 1376 d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe 81 PID 1376 wrote to memory of 3112 1376 d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe"C:\Users\Admin\AppData\Local\Temp\d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\d86ee7c6971f879dcb00411104c8c98f17324e71cf70671ddb7d08573cb05450.exe?2⤵PID:3112
-