Analysis
-
max time kernel
190s -
max time network
217s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 10:36
Static task
static1
Behavioral task
behavioral1
Sample
3db4cf8723f54731d382f9b6ce72766f05626f844eafd004fbd213218ab994ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3db4cf8723f54731d382f9b6ce72766f05626f844eafd004fbd213218ab994ef.exe
Resource
win10v2004-20221111-en
General
-
Target
3db4cf8723f54731d382f9b6ce72766f05626f844eafd004fbd213218ab994ef.exe
-
Size
71KB
-
MD5
00c5769f80c6f5290564055c30e12d62
-
SHA1
2f3282165b188ffb83aebfcff90d9754bb0b0a34
-
SHA256
3db4cf8723f54731d382f9b6ce72766f05626f844eafd004fbd213218ab994ef
-
SHA512
76861bb371d89891157da5e29832a6a9563d570a13886551d4ebba4b87772e94453864e6fa7345bfd85753183000e1d3b7afea4b28ad2822dbda2f8415093ab3
-
SSDEEP
1536:rvVTskgYdwTXQNu9Kr9KmlH4ZPGPPtUWMxAsi0nAQC13k4Ims/61:lWawTXQM9KJKmeZGPPtUWmpvC+4e/61
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2916-136-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/2916-139-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/2916-140-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/2916-142-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/2916-143-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2916 3db4cf8723f54731d382f9b6ce72766f05626f844eafd004fbd213218ab994ef.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4556 wrote to memory of 2916 4556 3db4cf8723f54731d382f9b6ce72766f05626f844eafd004fbd213218ab994ef.exe 83 PID 4556 wrote to memory of 2916 4556 3db4cf8723f54731d382f9b6ce72766f05626f844eafd004fbd213218ab994ef.exe 83 PID 4556 wrote to memory of 2916 4556 3db4cf8723f54731d382f9b6ce72766f05626f844eafd004fbd213218ab994ef.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\3db4cf8723f54731d382f9b6ce72766f05626f844eafd004fbd213218ab994ef.exe"C:\Users\Admin\AppData\Local\Temp\3db4cf8723f54731d382f9b6ce72766f05626f844eafd004fbd213218ab994ef.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\3db4cf8723f54731d382f9b6ce72766f05626f844eafd004fbd213218ab994ef.exe?2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2916
-