Analysis

  • max time kernel
    162s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2022 15:14

General

  • Target

    e310f8d72163ae12ae16c49d0ce137729de4d42a41f4729a878a05c8cb13ab64.exe

  • Size

    527KB

  • MD5

    8369304a396752402ab72bf137112d30

  • SHA1

    c06557c83af74b2393c1e377c7d8744ae02fac72

  • SHA256

    e310f8d72163ae12ae16c49d0ce137729de4d42a41f4729a878a05c8cb13ab64

  • SHA512

    924fbdd2a461712ea2adc6c684f2b2c0b8ada2dffbefba2b60620e30cbd09680072264265a2f1dcfdec15aedad7e1bef50bbdff15748e8405e590b47460eda6b

  • SSDEEP

    12288:dwrqyutB/hbOSSR/D/daDkyiHnMVuFRnnRnzUPsZ:4aPM/JwjiHngQBX

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e310f8d72163ae12ae16c49d0ce137729de4d42a41f4729a878a05c8cb13ab64.exe
    "C:\Users\Admin\AppData\Local\Temp\e310f8d72163ae12ae16c49d0ce137729de4d42a41f4729a878a05c8cb13ab64.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3312
    • C:\Users\Admin\AppData\Local\Temp\e310f8d72163ae12ae16c49d0ce137729de4d42a41f4729a878a05c8cb13ab64.exe
      tear
      2⤵
        PID:2968

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2968-133-0x0000000000000000-mapping.dmp

    • memory/2968-136-0x0000000005000000-0x0000000005056000-memory.dmp

      Filesize

      344KB

    • memory/2968-137-0x0000000005000000-0x0000000005056000-memory.dmp

      Filesize

      344KB

    • memory/3312-132-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/3312-134-0x0000000005000000-0x0000000005056000-memory.dmp

      Filesize

      344KB

    • memory/3312-135-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB