Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:10

General

  • Target

    e1b791f5d75ca236c35619d19996ecfed237a16e260b2a2e92f6b9c8fb1a4105.exe

  • Size

    535KB

  • MD5

    54429a68f385b098c307e14507ba39b0

  • SHA1

    5975f7e4bcbfbfa1284f4ce740b9c736d59c8b19

  • SHA256

    e1b791f5d75ca236c35619d19996ecfed237a16e260b2a2e92f6b9c8fb1a4105

  • SHA512

    fe6934a061486e3a0d4bc3425667d1bfce8050c2a1aee1850b33418f7dc716f6bfcd22f94d73a83ad91f1cc182783fa67c4ea639381d7f5deeb51292f5b682ef

  • SSDEEP

    12288:74sHRm668QQI5tn5Vk/w3xus16h+YzpHeRb:7xm668QQwnS0X16EM1I

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1b791f5d75ca236c35619d19996ecfed237a16e260b2a2e92f6b9c8fb1a4105.exe
    "C:\Users\Admin\AppData\Local\Temp\e1b791f5d75ca236c35619d19996ecfed237a16e260b2a2e92f6b9c8fb1a4105.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Users\Admin\AppData\Local\Temp\e1b791f5d75ca236c35619d19996ecfed237a16e260b2a2e92f6b9c8fb1a4105.exe
      tear
      2⤵
        PID:3276

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2164-132-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/2164-134-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/3276-133-0x0000000000000000-mapping.dmp

    • memory/3276-135-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/3276-136-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB