Analysis
-
max time kernel
94s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
c490e1e62e49b456b0cf3b263c57a4f40cf7efdb7dedc3c5599394f8565150b3N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
c490e1e62e49b456b0cf3b263c57a4f40cf7efdb7dedc3c5599394f8565150b3N.exe
Resource
win10v2004-20241007-en
General
-
Target
c490e1e62e49b456b0cf3b263c57a4f40cf7efdb7dedc3c5599394f8565150b3N.exe
-
Size
9.8MB
-
MD5
e12ef2c4e6a7d3b52db7431f8ec61130
-
SHA1
ed12c365e2f558169d07a4ab3231188d1dfdd3aa
-
SHA256
c490e1e62e49b456b0cf3b263c57a4f40cf7efdb7dedc3c5599394f8565150b3
-
SHA512
99cc94708c54556edae3879969617a82decdb9c3ea5861d0371e8671cacdf054159d76f5c79bcb5655a41bfed9630fa9117ad6702e3ac8da9978616ac3a035c7
-
SSDEEP
98304:tjYXWBBcI2NFpa27AtJ94H7n2Z0/8xs87BGiLlGn8jg8sQhSYFa:tjoN7VUqH7n8NjGElT7BFa
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4428 wrote to memory of 2692 4428 c490e1e62e49b456b0cf3b263c57a4f40cf7efdb7dedc3c5599394f8565150b3N.exe 100 PID 4428 wrote to memory of 2692 4428 c490e1e62e49b456b0cf3b263c57a4f40cf7efdb7dedc3c5599394f8565150b3N.exe 100 PID 4428 wrote to memory of 2692 4428 c490e1e62e49b456b0cf3b263c57a4f40cf7efdb7dedc3c5599394f8565150b3N.exe 100 PID 2692 wrote to memory of 4628 2692 notepad.exe 104 PID 2692 wrote to memory of 4628 2692 notepad.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\c490e1e62e49b456b0cf3b263c57a4f40cf7efdb7dedc3c5599394f8565150b3N.exe"C:\Users\Admin\AppData\Local\Temp\c490e1e62e49b456b0cf3b263c57a4f40cf7efdb7dedc3c5599394f8565150b3N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\System32\notepad.exeC:\\Windows\\System32\\notepad.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\System32\cmd.execmd3⤵PID:4628
-
-