Analysis

  • max time kernel
    135s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2022, 05:20

General

  • Target

    5fc71b611ac93e2bd8de181db7e1bcd29f736e5c987f179e8a84dbc0a1cb1933.exe

  • Size

    295KB

  • MD5

    6062b3028f30a1347e40e3035f43b6e0

  • SHA1

    10bbdade438f2f67d1c71830c8535bba48d1a84e

  • SHA256

    5fc71b611ac93e2bd8de181db7e1bcd29f736e5c987f179e8a84dbc0a1cb1933

  • SHA512

    8ecb73142391ea946827a48805028a27affe38158b4f2ff4497523938da35a6d5d8201fb494437b27a45af95738356e111e4fd5bee5b55286dabfd0a3a10893a

  • SSDEEP

    6144:UTpDzzcIILJy+smkBj7MLsEVFmU0nLom8DkAB84iGOibX8CSQ8p3nsxV7MoGW:uzQ1nsmA7MLsEKLNKBymOxnsP7c

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5fc71b611ac93e2bd8de181db7e1bcd29f736e5c987f179e8a84dbc0a1cb1933.exe
    "C:\Users\Admin\AppData\Local\Temp\5fc71b611ac93e2bd8de181db7e1bcd29f736e5c987f179e8a84dbc0a1cb1933.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Users\Admin\AppData\Local\Temp\5fc71b611ac93e2bd8de181db7e1bcd29f736e5c987f179e8a84dbc0a1cb1933.exe
      tear
      2⤵
        PID:3024

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3024-134-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/3024-135-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/4848-133-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB