Analysis
-
max time kernel
102s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
04-03-2023 03:23
Static task
static1
Behavioral task
behavioral1
Sample
c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe
Resource
win10v2004-20230221-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe
-
Size
4.6MB
-
MD5
a26a2d5073f977759ef540e4a734497f
-
SHA1
a384ed627111b81a6469ee1fa47f4a0a0e7a62d0
-
SHA256
c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da
-
SHA512
05de0ab3ac40dd0490655bcaa9434db23ec93ac27338aa05053fcfb4b3cd7f7a5d3faf2c52b5ff17de35a5483302ae6a62616da32acc9e7d0960772f11320329
-
SSDEEP
98304:A42t3fy2VMLFDQ3lp9TgIpQ5cc+ltgm6Jfbn27nv0nm6xQPG:3b2VMQgYQ0ltgm6ZbXnmfO
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2904 wrote to memory of 452 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 88 PID 2904 wrote to memory of 452 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 88 PID 2904 wrote to memory of 452 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 88 PID 2904 wrote to memory of 3736 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 89 PID 2904 wrote to memory of 3736 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 89 PID 2904 wrote to memory of 3736 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 89 PID 2904 wrote to memory of 5032 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 90 PID 2904 wrote to memory of 5032 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 90 PID 2904 wrote to memory of 5032 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 90 PID 2904 wrote to memory of 4340 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 91 PID 2904 wrote to memory of 4340 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 91 PID 2904 wrote to memory of 4340 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 91 PID 2904 wrote to memory of 1920 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 92 PID 2904 wrote to memory of 1920 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 92 PID 2904 wrote to memory of 1920 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 92 PID 2904 wrote to memory of 1048 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 93 PID 2904 wrote to memory of 1048 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 93 PID 2904 wrote to memory of 1048 2904 c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe"C:\Users\Admin\AppData\Local\Temp\c8dd9339ff6ae6ccfa38029a1afe34d55252a722518b5c354e987b892a8ee8da.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:452
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3736
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:5032
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4340
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1048
-