Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-06-2022 15:49

General

  • Target

    509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe

  • Size

    2.3MB

  • MD5

    addd93ff7bf2e53744e25b39e6057547

  • SHA1

    b64ef50db800a0850a7fa89a7f5d13977ac3f1d3

  • SHA256

    509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7

  • SHA512

    7cb1ad47627b2b5958ece2bf6d509acb89a62f0f0429f24b792701bd8986c3f77cf7ec126acad257ccce6965e77908a27e43620829927cc1b3032f9218756254

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe
    "C:\Users\Admin\AppData\Local\Temp\509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Users\Admin\AppData\Local\Temp\509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe"
      2⤵
        PID:2100
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Users\Admin\AppData\Local\Temp\509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe"
        2⤵
          PID:1048
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Users\Admin\AppData\Local\Temp\509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe"
          2⤵
            PID:2612

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1048-132-0x0000000000000000-mapping.dmp
        • memory/1604-130-0x0000000002410000-0x000000000248B000-memory.dmp
          Filesize

          492KB

        • memory/1604-134-0x0000000002490000-0x0000000002633000-memory.dmp
          Filesize

          1.6MB

        • memory/1604-135-0x0000000002410000-0x000000000248B000-memory.dmp
          Filesize

          492KB

        • memory/2100-131-0x0000000000000000-mapping.dmp
        • memory/2612-133-0x0000000000000000-mapping.dmp