Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
620d207a43b68de3269641f6c378f0e2d235a4938b9681bbb888e91fce0890d9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
620d207a43b68de3269641f6c378f0e2d235a4938b9681bbb888e91fce0890d9.exe
Resource
win10v2004-20220812-en
General
-
Target
620d207a43b68de3269641f6c378f0e2d235a4938b9681bbb888e91fce0890d9.exe
-
Size
133KB
-
MD5
b8ff5883f9ab25f6e349b5303a4abfa8
-
SHA1
6fc2d81f47fd74ae88052d8c1d1283d783e2440a
-
SHA256
620d207a43b68de3269641f6c378f0e2d235a4938b9681bbb888e91fce0890d9
-
SHA512
4b96c0dc51646c60adbaeab97dcc9d90444c3df45a5cda740542e3a3b10c16b0f12a3ea50c10d339961415059f700d4464cdeb9b84be894444c1e2ced5c5586c
-
SSDEEP
3072:/V3po49i5qyrTD7iwjBDoifphYSoA0GbhbhiHqiUDEK/8:/9qqyrTXzBbDY5A0GbviHq/DEB
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4696-134-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4696-138-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4696-139-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4696-140-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4696-141-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4772 wrote to memory of 4696 4772 620d207a43b68de3269641f6c378f0e2d235a4938b9681bbb888e91fce0890d9.exe 80 PID 4772 wrote to memory of 4696 4772 620d207a43b68de3269641f6c378f0e2d235a4938b9681bbb888e91fce0890d9.exe 80 PID 4772 wrote to memory of 4696 4772 620d207a43b68de3269641f6c378f0e2d235a4938b9681bbb888e91fce0890d9.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\620d207a43b68de3269641f6c378f0e2d235a4938b9681bbb888e91fce0890d9.exe"C:\Users\Admin\AppData\Local\Temp\620d207a43b68de3269641f6c378f0e2d235a4938b9681bbb888e91fce0890d9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\620d207a43b68de3269641f6c378f0e2d235a4938b9681bbb888e91fce0890d9.exe?2⤵PID:4696
-