Analysis

  • max time kernel
    160s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2022 18:06

General

  • Target

    761b16e3de2ce7e71c0e858c46ff9e091aeb51c5c33c250ff174beebe33c0090.exe

  • Size

    310KB

  • MD5

    6a3356b0af61ab1bc16b70030f636fb0

  • SHA1

    c16731d272284e49cdb62ede5a41e27ed9db807f

  • SHA256

    761b16e3de2ce7e71c0e858c46ff9e091aeb51c5c33c250ff174beebe33c0090

  • SHA512

    1a9635142eb71b51e8d55bedeb9ce8be0959f17e053a82b5b8e8d3edec924330231fec50c4566766aa139098f33bad1ac41becc347d49601e60347b7769bd8df

  • SSDEEP

    6144:m1hC7/Qeinc/8wkUfYAko2dXLKrE0kWm1mrsg9SZl:mu0HnQ5YAL2xKXkWDd9SZl

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\761b16e3de2ce7e71c0e858c46ff9e091aeb51c5c33c250ff174beebe33c0090.exe
    "C:\Users\Admin\AppData\Local\Temp\761b16e3de2ce7e71c0e858c46ff9e091aeb51c5c33c250ff174beebe33c0090.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3816
    • C:\Users\Admin\AppData\Local\Temp\761b16e3de2ce7e71c0e858c46ff9e091aeb51c5c33c250ff174beebe33c0090.exe
      tear
      2⤵
        PID:2032

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2032-132-0x0000000000000000-mapping.dmp

    • memory/2032-134-0x0000000000400000-0x0000000000463000-memory.dmp

      Filesize

      396KB

    • memory/2032-135-0x0000000000400000-0x0000000000463000-memory.dmp

      Filesize

      396KB

    • memory/3816-133-0x0000000000400000-0x0000000000463000-memory.dmp

      Filesize

      396KB