Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
16-06-2024 09:46
Static task
static1
Behavioral task
behavioral1
Sample
c86218367d0caf1b3939762afbb20f97e941da48d10725eb49239126dacd2422.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
c86218367d0caf1b3939762afbb20f97e941da48d10725eb49239126dacd2422.exe
Resource
win11-20240419-en
General
-
Target
c86218367d0caf1b3939762afbb20f97e941da48d10725eb49239126dacd2422.exe
-
Size
4.2MB
-
MD5
ccd45a73d555f6a89b06924e150680e5
-
SHA1
29c5b9112eff6078f78926a62c2a3387dc292db1
-
SHA256
c86218367d0caf1b3939762afbb20f97e941da48d10725eb49239126dacd2422
-
SHA512
f98f7eea29dc1d2c0f859035ddbdcca430133817b62ca6bb29881fc8acfc8cd17852770db0a320bea8169cd1307c87dde72ca2f7460d99425798f9ee29e11245
-
SSDEEP
49152:uh0L6UQC+fua+hyHdzy8XkH5DaJc9zOPoze8MoRwFS0bM1qck0zdB0VF1NVm:uyL6Uouxhf9zOPozzE0zqV
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3648 wrote to memory of 3580 3648 c86218367d0caf1b3939762afbb20f97e941da48d10725eb49239126dacd2422.exe 77 PID 3648 wrote to memory of 3580 3648 c86218367d0caf1b3939762afbb20f97e941da48d10725eb49239126dacd2422.exe 77 PID 3648 wrote to memory of 3580 3648 c86218367d0caf1b3939762afbb20f97e941da48d10725eb49239126dacd2422.exe 77 PID 3580 wrote to memory of 2144 3580 cmd.exe 79 PID 3580 wrote to memory of 2144 3580 cmd.exe 79 PID 3580 wrote to memory of 2144 3580 cmd.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\c86218367d0caf1b3939762afbb20f97e941da48d10725eb49239126dacd2422.exe"C:\Users\Admin\AppData\Local\Temp\c86218367d0caf1b3939762afbb20f97e941da48d10725eb49239126dacd2422.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "reg add \"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\" /v WinUpdate /t REG_SZ /d \"C:\Users\Admin\AppData\Local\Temp\c86218367d0caf1b3939762afbb20f97e941da48d10725eb49239126dacd2422.exe\""2⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\reg.exereg add \"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\" /v WinUpdate /t REG_SZ /d \"C:\Users\Admin\AppData\Local\Temp\c86218367d0caf1b3939762afbb20f97e941da48d10725eb49239126dacd2422.exe\"3⤵PID:2144
-
-