Analysis

  • max time kernel
    161s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2022, 00:37

General

  • Target

    c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exe

  • Size

    522KB

  • MD5

    4bc50d57ef7046ed6b70ca1cca3bce9a

  • SHA1

    d9a0af13b93eae7cc09c863296139d15b5f9b456

  • SHA256

    c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de

  • SHA512

    b90a6915d50321467852c4e7662871c4e841527b393fb0eec62470214eab3840b8d6338654ef6557cf313bb81615ebe6bb5ba2e2b81e6cc7cf19972c19e6eece

  • SSDEEP

    6144:r6H2Cm4thb9C6QfKOZIJWAwCoYhEL8XlbFIszwU2rFPAJmQy1CrxQqD9RSaSz+8d:Em4thb7QVXPb8Vd66y18xQqpx8O5q

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exe
    "C:\Users\Admin\AppData\Local\Temp\c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Users\Admin\AppData\Local\Temp\c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exe
      start
      2⤵
        PID:2784
      • C:\Users\Admin\AppData\Local\Temp\c96f8a511204d24e1a494398601e734237882ee6efea4eed753374a2685e02de.exe
        watch
        2⤵
          PID:1240

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1240-137-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1240-139-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1240-141-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/2580-132-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/2580-135-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/2784-136-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/2784-138-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/2784-140-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB