Analysis

  • max time kernel
    127s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2022, 01:51

General

  • Target

    fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exe

  • Size

    522KB

  • MD5

    d416bd48b546afc16b79ab4362f35831

  • SHA1

    e4bb7e6f4b1ebb141b0a45c9b4a9bd4cc263baf6

  • SHA256

    fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c

  • SHA512

    17ea64a699388dcfaba5be58da14bc972514a2b45bf3a375925c617530a3d14ae0a59803e4315e75cb4771fc608cb3e5f045b20035a3d5fc7e585e9012425e37

  • SSDEEP

    6144:SDuwNWG/hqSEWSipzuIs9AjBw9bX3asWXhddNbRGODYYaBAmQy1CrxQqD9RSaSzG:34EC8VxsXbsW9ny18xQqpx8O5VuF

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exe
    "C:\Users\Admin\AppData\Local\Temp\fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\Users\Admin\AppData\Local\Temp\fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exe
      start
      2⤵
        PID:4628
      • C:\Users\Admin\AppData\Local\Temp\fc981b9e6fd20868737fc1c9f0e9e20b9b11789d232f6ed83876c9d8396d043c.exe
        watch
        2⤵
          PID:4636

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/4628-137-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/4628-139-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/4628-140-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/4636-136-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/4636-138-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/4636-141-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/4952-132-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/4952-135-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB