Analysis

  • max time kernel
    152s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:59

General

  • Target

    ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe

  • Size

    522KB

  • MD5

    6f9896d0134b824ab5da4e3025335236

  • SHA1

    aa4af4ef29e9b2be25c37e3363d10bcf7c70719f

  • SHA256

    ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3

  • SHA512

    32acadc23e411d3e3d9537d28e3a772ab91af55ba5ac830a43f696b4f5191695f94e4a5776133e740e518158ca2cee73b7161e50849e4a35eeacf9d9fea3cba8

  • SSDEEP

    6144:LUF8lzohn6ACOAPOpo1JO0EyZpFH+CLUcmQy1CrxQqD9RSaSz+8O5NGBe:gF8ls7bpo1JTNVesy18xQqpx8O5N

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe
    "C:\Users\Admin\AppData\Local\Temp\ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Users\Admin\AppData\Local\Temp\ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe
      start
      2⤵
        PID:1304
      • C:\Users\Admin\AppData\Local\Temp\ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe
        watch
        2⤵
          PID:4004

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/220-132-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/220-135-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1304-134-0x0000000000000000-mapping.dmp
      • memory/1304-137-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1304-139-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1304-140-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1304-141-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4004-133-0x0000000000000000-mapping.dmp
      • memory/4004-136-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4004-138-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4004-142-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB