Analysis

  • max time kernel
    204s
  • max time network
    211s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:07

General

  • Target

    b5928522e23bac0c8caf5bc9a700bdf78d4be8f61aaeeb9589e6c1f72c2d68b1.exe

  • Size

    527KB

  • MD5

    4991db55d398816ed39e4018185d1f32

  • SHA1

    49d6b17075acf40ca7c6099f477af2a29cefa8d9

  • SHA256

    b5928522e23bac0c8caf5bc9a700bdf78d4be8f61aaeeb9589e6c1f72c2d68b1

  • SHA512

    753aac60ff03ec45fa8fbb87461bf652846191f970b446badaa699c3332767c75bf5405c810ff6b21848b0abc2d3ec270744a461c1e3cda3d070636ced21da1f

  • SSDEEP

    6144:D5dxOwfHJAiow5y94gwphO365BkSVaEP0Mb9Ycwt1aARJ3++smbC8F51yRAo/iR6:D5ntfHJ1Y3Wfnq1Hqsl1yZ/+d8VsWx

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5928522e23bac0c8caf5bc9a700bdf78d4be8f61aaeeb9589e6c1f72c2d68b1.exe
    "C:\Users\Admin\AppData\Local\Temp\b5928522e23bac0c8caf5bc9a700bdf78d4be8f61aaeeb9589e6c1f72c2d68b1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\AppData\Local\Temp\b5928522e23bac0c8caf5bc9a700bdf78d4be8f61aaeeb9589e6c1f72c2d68b1.exe
      tear
      2⤵
        PID:2992

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/756-132-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/756-134-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/2992-133-0x0000000000000000-mapping.dmp

    • memory/2992-135-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/2992-136-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB