Analysis
-
max time kernel
194s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 11:07
Static task
static1
Behavioral task
behavioral1
Sample
20818004185162dd00bb3348cb0f9bafee3eea3aeac366d6e43baa47bb842b52.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20818004185162dd00bb3348cb0f9bafee3eea3aeac366d6e43baa47bb842b52.exe
Resource
win10v2004-20220812-en
General
-
Target
20818004185162dd00bb3348cb0f9bafee3eea3aeac366d6e43baa47bb842b52.exe
-
Size
133KB
-
MD5
4393df8f8cb3de2af4c6cd4148c60576
-
SHA1
99a0e3c03652cd00af6e423a6b7c1f1d877da16d
-
SHA256
20818004185162dd00bb3348cb0f9bafee3eea3aeac366d6e43baa47bb842b52
-
SHA512
146bc365c1e11b1c9a9c1bf2ac09080b72bc39362a994f852cd336fade9483ca6e6abd7cf8a3ca46d2323c6bdcd6cc37a332f50b3786cc39fe891d9080698c5e
-
SSDEEP
3072:HV3poXmFxjQt+s80rvi6UoifphYSoA0GbhbhiTqiXWn/P:bc986vi5DY5A0GbviTqz
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4140-134-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4140-138-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4140-137-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4140-140-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4140-141-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4236 wrote to memory of 4140 4236 20818004185162dd00bb3348cb0f9bafee3eea3aeac366d6e43baa47bb842b52.exe 79 PID 4236 wrote to memory of 4140 4236 20818004185162dd00bb3348cb0f9bafee3eea3aeac366d6e43baa47bb842b52.exe 79 PID 4236 wrote to memory of 4140 4236 20818004185162dd00bb3348cb0f9bafee3eea3aeac366d6e43baa47bb842b52.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\20818004185162dd00bb3348cb0f9bafee3eea3aeac366d6e43baa47bb842b52.exe"C:\Users\Admin\AppData\Local\Temp\20818004185162dd00bb3348cb0f9bafee3eea3aeac366d6e43baa47bb842b52.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\20818004185162dd00bb3348cb0f9bafee3eea3aeac366d6e43baa47bb842b52.exe?2⤵PID:4140
-