Analysis

  • max time kernel
    91s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2022, 02:00

General

  • Target

    ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exe

  • Size

    522KB

  • MD5

    5dcdc79f3a3e9c0ae40fadbde1030d86

  • SHA1

    3525c5b6194052eeec3fb16412d6279d9b1a33be

  • SHA256

    ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4

  • SHA512

    0ea912d2cedbfda3232783abb8ce989546ec20b81cb17c7c8399f836f0010d796b7051de50c2f9387cb96c24c3b13ee422590e5a2670eee9107376a058f9d275

  • SSDEEP

    6144:QGS+fj5W6FxwvFlOMWfVE7sBLHP/z7uAOGoERwyEVjCZmQy1CrxQqD9RSaSz+8Oa:rtA8xwvFlz+VFDH+4fby18xQqpx8O5Z

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exe
    "C:\Users\Admin\AppData\Local\Temp\ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Users\Admin\AppData\Local\Temp\ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exe
      start
      2⤵
        PID:1700
      • C:\Users\Admin\AppData\Local\Temp\ca78df596bb18b5263dcb0ce224a2101e66397d9c27fe0d216a655eb504044e4.exe
        watch
        2⤵
          PID:1672

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1672-136-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1672-138-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1672-140-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1672-143-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1700-137-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1700-139-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1700-141-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1700-142-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/5064-132-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/5064-135-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB