Analysis

  • max time kernel
    164s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:46

General

  • Target

    8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe

  • Size

    104KB

  • MD5

    8aa6527fe746c81cda4e7583340bd8b7

  • SHA1

    67b7e92e2d75b0928dc35921ecd220cf8bcc0b2a

  • SHA256

    8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85

  • SHA512

    94e9a5f010928b53d1d68c8abd970e34baefffacb0b4b7446d8f2f1b0b364b81336f2e195f6b95e3f55d0d1b5703d8b6a4f76a618b4c56fcf8afb6d2ea0c390b

  • SSDEEP

    1536:Nh98TBsfJQ/XNng6jBmEMxqETw48PKqSZDvEI3c9t5sNG9ACenAC7RMB2DTALP:uBsBQPNgsKhDvEb9vDA5na2ID

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe
    "C:\Users\Admin\AppData\Local\Temp\8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:616
    • C:\Users\Admin\AppData\Local\Temp\8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe
      "C:\Users\Admin\AppData\Local\Temp\8ad92ecde508c3557bfa792e5e3883df48f4333e0aff973d33d12401db8ddc85.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4352

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~temp0351170419.tmp
    Filesize

    12B

    MD5

    e85cb39940d6d87f85824a5ecd3030e4

    SHA1

    86ee22608b0190e41e5740bd00e9686466b93298

    SHA256

    9322ca9fd4fe200e5445d67e1fa81ac875acd7060bb5f54cb195eb5be4d7de9c

    SHA512

    c28d3648ef42bb7fe9c4b787f978b89c70c924f045cbeb3619b778d92bcdb4beb099e01bcfe7474c1356456ebfe94cd4acdf2d6b40f30477c2c859194749a79e

  • memory/616-132-0x0000000000400000-0x0000000000476000-memory.dmp
    Filesize

    472KB

  • memory/616-134-0x0000000000400000-0x0000000000476000-memory.dmp
    Filesize

    472KB

  • memory/4352-133-0x0000000000000000-mapping.dmp
  • memory/4352-137-0x0000000000400000-0x0000000000476000-memory.dmp
    Filesize

    472KB

  • memory/4352-138-0x0000000000400000-0x0000000000476000-memory.dmp
    Filesize

    472KB

  • memory/4352-139-0x0000000000400000-0x000000000057A000-memory.dmp
    Filesize

    1.5MB