Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-06-2022 15:49
Static task
static1
Behavioral task
behavioral1
Sample
509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe
-
Size
2.3MB
-
MD5
addd93ff7bf2e53744e25b39e6057547
-
SHA1
b64ef50db800a0850a7fa89a7f5d13977ac3f1d3
-
SHA256
509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7
-
SHA512
7cb1ad47627b2b5958ece2bf6d509acb89a62f0f0429f24b792701bd8986c3f77cf7ec126acad257ccce6965e77908a27e43620829927cc1b3032f9218756254
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 46 IoCs
Processes:
509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exepid process 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exedescription pid process target process PID 1604 wrote to memory of 2100 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe cmd.exe PID 1604 wrote to memory of 2100 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe cmd.exe PID 1604 wrote to memory of 2100 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe cmd.exe PID 1604 wrote to memory of 1048 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe cmd.exe PID 1604 wrote to memory of 1048 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe cmd.exe PID 1604 wrote to memory of 1048 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe cmd.exe PID 1604 wrote to memory of 2612 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe cmd.exe PID 1604 wrote to memory of 2612 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe cmd.exe PID 1604 wrote to memory of 2612 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe cmd.exe PID 1604 wrote to memory of 2612 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe cmd.exe PID 1604 wrote to memory of 2612 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe cmd.exe PID 1604 wrote to memory of 2612 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe cmd.exe PID 1604 wrote to memory of 2612 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe cmd.exe PID 1604 wrote to memory of 2612 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe cmd.exe PID 1604 wrote to memory of 2612 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe cmd.exe PID 1604 wrote to memory of 2612 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe cmd.exe PID 1604 wrote to memory of 2612 1604 509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe"C:\Users\Admin\AppData\Local\Temp\509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Users\Admin\AppData\Local\Temp\509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Users\Admin\AppData\Local\Temp\509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Users\Admin\AppData\Local\Temp\509f6bb22524158322b48975cd1bb634bc0d9a460389565296b640f62c31cdd7.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1048-132-0x0000000000000000-mapping.dmp
-
memory/1604-130-0x0000000002410000-0x000000000248B000-memory.dmpFilesize
492KB
-
memory/1604-134-0x0000000002490000-0x0000000002633000-memory.dmpFilesize
1.6MB
-
memory/1604-135-0x0000000002410000-0x000000000248B000-memory.dmpFilesize
492KB
-
memory/2100-131-0x0000000000000000-mapping.dmp
-
memory/2612-133-0x0000000000000000-mapping.dmp