Analysis

  • max time kernel
    150s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2022 15:51

General

  • Target

    eb43249ee1e6a33a781904abcd2219cd241a7f8c7480a5c5b3d0abd9ee996564.exe

  • Size

    36KB

  • MD5

    60403e3f6417ff6d14c7703c44ec641c

  • SHA1

    4e2ae95a52107440af6137acb914af6d841f2596

  • SHA256

    eb43249ee1e6a33a781904abcd2219cd241a7f8c7480a5c5b3d0abd9ee996564

  • SHA512

    e811dbedff5951c284edbb23b8a8d3b32a80be9af4a1554e3ee4282f1f312edc5fccf609a9332be568c662ce6d1997d9cb5c690ec2fedf1a6878b5f586c44eb7

  • SSDEEP

    384:0zupvEeoRjQI23CdbKeBNzTW7C91mKdyUlXz84tX:0svEztl4EN5MKdhlj84tX

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb43249ee1e6a33a781904abcd2219cd241a7f8c7480a5c5b3d0abd9ee996564.exe
    "C:\Users\Admin\AppData\Local\Temp\eb43249ee1e6a33a781904abcd2219cd241a7f8c7480a5c5b3d0abd9ee996564.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\WINDOWS\system32\bktsqrojfq.sd,mymain
      2⤵
        PID:1944

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1944-132-0x0000000000000000-mapping.dmp