Analysis

  • max time kernel
    170s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:56

General

  • Target

    bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe

  • Size

    518KB

  • MD5

    dad66d78a35cd54bcaa7de8795f07a07

  • SHA1

    61f105e243752f705201995f54ff90151ad82a84

  • SHA256

    bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7

  • SHA512

    e70b96a158fc2da0dc418af5df5144659f85312e076de0d22b97f96f4033cc050fbbaca86f938833a2b53033af233d401b59f7a418ffb5bbb27228834bb5d46b

  • SSDEEP

    12288:aBBudCwJmj9jNAaDfUUHwYYlLPt5oKnWq3Sb:a+KpNPjqlLPt5/WL

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe
    "C:\Users\Admin\AppData\Local\Temp\bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Users\Admin\AppData\Local\Temp\bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe
      start
      2⤵
        PID:2816
      • C:\Users\Admin\AppData\Local\Temp\bbd3902ab3c7d052a523c21b7b3066cea6d358b04854dc6ef1cb477a85f923d7.exe
        watch
        2⤵
          PID:964

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/964-133-0x0000000000000000-mapping.dmp
      • memory/964-137-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/964-139-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/964-142-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/2816-134-0x0000000000000000-mapping.dmp
      • memory/2816-136-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/2816-138-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/2816-140-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/2816-141-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/3424-132-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/3424-135-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB