Analysis

  • max time kernel
    101s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:56

General

  • Target

    bde5fd5f2a0c6827a613bdc6a5b2e99209ab5a57aa72956df3b6a86ea963c38b.exe

  • Size

    518KB

  • MD5

    23c92fd92736340f46fbdc53ff750c8f

  • SHA1

    ee0f6e0175b9d22dc3194c15f83770a0262e0f64

  • SHA256

    bde5fd5f2a0c6827a613bdc6a5b2e99209ab5a57aa72956df3b6a86ea963c38b

  • SHA512

    a6d25ffeafe820a20f57ab85a52f6f75b2a25af3462278588704f8e03da456dfb1695814e78418067f61fba680a25089d5df20e16c78a4b572bd125643e60cad

  • SSDEEP

    12288:qNSNRje3KidVs9mSPnEgORnwYYlLPt5oKnWq39bN:qNyjmddVsMSPErilLPt5/WsN

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bde5fd5f2a0c6827a613bdc6a5b2e99209ab5a57aa72956df3b6a86ea963c38b.exe
    "C:\Users\Admin\AppData\Local\Temp\bde5fd5f2a0c6827a613bdc6a5b2e99209ab5a57aa72956df3b6a86ea963c38b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Users\Admin\AppData\Local\Temp\bde5fd5f2a0c6827a613bdc6a5b2e99209ab5a57aa72956df3b6a86ea963c38b.exe
      start
      2⤵
        PID:4720
      • C:\Users\Admin\AppData\Local\Temp\bde5fd5f2a0c6827a613bdc6a5b2e99209ab5a57aa72956df3b6a86ea963c38b.exe
        watch
        2⤵
          PID:4208

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4208-133-0x0000000000000000-mapping.dmp

      • memory/4208-136-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/4208-139-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/4208-142-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/4720-134-0x0000000000000000-mapping.dmp

      • memory/4720-137-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/4720-138-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/4720-140-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/4720-141-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/5072-132-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/5072-135-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB