Analysis

  • max time kernel
    136s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 18:28

General

  • Target

    41192d51fc6347ae04b6d860061b3ec99c0f9a6225dc4246c55fec93a6b3ac7a.exe

  • Size

    236KB

  • MD5

    27d87ba0f5fdf2a06de73958e3bab50d

  • SHA1

    4364f7647fb587ebd3023ea10f5884a4055af05c

  • SHA256

    41192d51fc6347ae04b6d860061b3ec99c0f9a6225dc4246c55fec93a6b3ac7a

  • SHA512

    83adf6f539288338f3ac59146e2a0ae31db645d3bbaf6506e424e70e7822effd3575e400cb9a0c400eb8f92e1943bc61a818f74de57c7cb74f654e92ff0fc106

  • SSDEEP

    3072:FwKO4yZAEeV8mc2mUnhdFXvD85xJmngX/xcqi:xwalmUnhXAJ5/7i

Score
1/10

Malware Config

Signatures

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41192d51fc6347ae04b6d860061b3ec99c0f9a6225dc4246c55fec93a6b3ac7a.exe
    "C:\Users\Admin\AppData\Local\Temp\41192d51fc6347ae04b6d860061b3ec99c0f9a6225dc4246c55fec93a6b3ac7a.exe"
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:4172

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2024-133-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB