Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2022 16:34
Static task
static1
Behavioral task
behavioral1
Sample
10520eef62249d90e78bb05ea7c67322.exe
Resource
win7-20220812-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
10520eef62249d90e78bb05ea7c67322.exe
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
10520eef62249d90e78bb05ea7c67322.exe
-
Size
88KB
-
MD5
10520eef62249d90e78bb05ea7c67322
-
SHA1
18fdfad1afa31ca222451e656cb592df7eaaa60f
-
SHA256
e50d7612867722fff23e0bb61ae117b5cfe6fc843e17c8c3a4deb413820170c4
-
SHA512
f5071864b34f92704d2ed5aa80029a5d0a42f7fbc5ee5ae4b61088a18f614339fef952c53ebe7496766c19f8d6302f821e8fca953aa712f138560bde73264c22
-
SSDEEP
1536:kkwsqJnYltZAV8m01IwWSDNHGV4tTl6Nh+qyFdGA2cTdrOoUBmKNeOe8V/m:kkwsqCltSV8kS5/2h+qUdUckoUBmQpev
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
10520eef62249d90e78bb05ea7c67322.exedescription pid process target process PID 3444 wrote to memory of 5060 3444 10520eef62249d90e78bb05ea7c67322.exe 10520eef62249d90e78bb05ea7c67322.exe PID 3444 wrote to memory of 5060 3444 10520eef62249d90e78bb05ea7c67322.exe 10520eef62249d90e78bb05ea7c67322.exe PID 3444 wrote to memory of 5060 3444 10520eef62249d90e78bb05ea7c67322.exe 10520eef62249d90e78bb05ea7c67322.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10520eef62249d90e78bb05ea7c67322.exe"C:\Users\Admin\AppData\Local\Temp\10520eef62249d90e78bb05ea7c67322.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\10520eef62249d90e78bb05ea7c67322.exe"C:\Users\Admin\AppData\Local\Temp\10520eef62249d90e78bb05ea7c67322.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5060-132-0x0000000000000000-mapping.dmp