Analysis
-
max time kernel
213s -
max time network
227s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:55
Static task
static1
Behavioral task
behavioral1
Sample
c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exe
Resource
win10v2004-20221111-en
General
-
Target
c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exe
-
Size
522KB
-
MD5
0911f2dc50778e44433439f126b6dc4f
-
SHA1
6dddbe02d97f9eab77ebfdc3de80b58599c37862
-
SHA256
c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4
-
SHA512
8ca665b77ac792545c5c7e4027ec499fd8717914d6dfb7668487a133af1ec4bb767af7fb14509e02cf24690312b9c3eefd09a1b05c3cf65c08f4d94b19c49a92
-
SSDEEP
12288:00tKD8vRasN4vKARyqhjKy18xQqpx8O5A:XzJasN3A1eatqpx8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exedescription pid process target process PID 3920 wrote to memory of 3540 3920 c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exe c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exe PID 3920 wrote to memory of 3540 3920 c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exe c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exe PID 3920 wrote to memory of 3540 3920 c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exe c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exe PID 3920 wrote to memory of 2580 3920 c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exe c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exe PID 3920 wrote to memory of 2580 3920 c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exe c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exe PID 3920 wrote to memory of 2580 3920 c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exe c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exe"C:\Users\Admin\AppData\Local\Temp\c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exewatch2⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\c55b042ef819c14bb28b164ecb509d8b3779d19136a5fd035833d94d163079a4.exestart2⤵PID:3540
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2580-133-0x0000000000000000-mapping.dmp
-
memory/2580-136-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2580-138-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2580-140-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2580-143-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/3540-134-0x0000000000000000-mapping.dmp
-
memory/3540-137-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/3540-139-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/3540-141-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/3540-142-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/3920-132-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/3920-135-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB