Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2023 14:58
Static task
static1
Behavioral task
behavioral1
Sample
bd38a5ec8fe7f50647e8d16d119058656f5099d99ef1713081add04dcea453fa_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
bd38a5ec8fe7f50647e8d16d119058656f5099d99ef1713081add04dcea453fa_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
bd38a5ec8fe7f50647e8d16d119058656f5099d99ef1713081add04dcea453fa_JC.exe
-
Size
348KB
-
MD5
7f4fdfffcbccb427dcdad0bdf96b0a17
-
SHA1
4111b148181f8d0a9d847f9ba0a6838b79e6f9b5
-
SHA256
bd38a5ec8fe7f50647e8d16d119058656f5099d99ef1713081add04dcea453fa
-
SHA512
8fba5cd6f9851e98320d8ecb3ba008c10135c5d4c63f89403b45775cbcd0484d708cd9bc086aef77319e58126a427a98842dbc4d4a9b1d21656dcc07c3b73023
-
SSDEEP
6144:vr9BIKD2SJMzodRpUZNFvzhwH5v/y+uwWRpZMc/b03KdeRV+9dk6ceh9X3P9:BfD2S+j5h0vRLGk6ceX
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
bd38a5ec8fe7f50647e8d16d119058656f5099d99ef1713081add04dcea453fa_JC.exedescription pid process target process PID 2516 wrote to memory of 3080 2516 bd38a5ec8fe7f50647e8d16d119058656f5099d99ef1713081add04dcea453fa_JC.exe bd38a5ec8fe7f50647e8d16d119058656f5099d99ef1713081add04dcea453fa_JC.exe PID 2516 wrote to memory of 3080 2516 bd38a5ec8fe7f50647e8d16d119058656f5099d99ef1713081add04dcea453fa_JC.exe bd38a5ec8fe7f50647e8d16d119058656f5099d99ef1713081add04dcea453fa_JC.exe PID 2516 wrote to memory of 3080 2516 bd38a5ec8fe7f50647e8d16d119058656f5099d99ef1713081add04dcea453fa_JC.exe bd38a5ec8fe7f50647e8d16d119058656f5099d99ef1713081add04dcea453fa_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd38a5ec8fe7f50647e8d16d119058656f5099d99ef1713081add04dcea453fa_JC.exe"C:\Users\Admin\AppData\Local\Temp\bd38a5ec8fe7f50647e8d16d119058656f5099d99ef1713081add04dcea453fa_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\bd38a5ec8fe7f50647e8d16d119058656f5099d99ef1713081add04dcea453fa_JC.exeC:\Users\Admin\AppData\Local\Temp\bd38a5ec8fe7f50647e8d16d119058656f5099d99ef1713081add04dcea453fa_JC.exe2⤵PID:3080