Analysis

  • max time kernel
    173s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:02

General

  • Target

    93b807bedede8dcf32c2a5b4a6232c2d05239376a3c4b90cc1da2c1f00ed3b29.exe

  • Size

    522KB

  • MD5

    63c50dc9f8307006429d59c7b1006047

  • SHA1

    c1fd784441150ad8fb470e9e323dab993f23cafa

  • SHA256

    93b807bedede8dcf32c2a5b4a6232c2d05239376a3c4b90cc1da2c1f00ed3b29

  • SHA512

    fcae5cb87f5f9b71b2cab54cdcf965061e2af41cd354b7382aa109f049e24a06fd7d2dce4a08cc0566b1695b6f3f897689651483451dd595de74a56fdf34421c

  • SSDEEP

    6144:kd5KVCpEwy6HjuG2x5j162j1qjMb3d1wy+cAFYHD2mQy1CrxQqD9RSaSz+8O57nf:bSEwZYx5jwotyyGYjOy18xQqpx8O576

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93b807bedede8dcf32c2a5b4a6232c2d05239376a3c4b90cc1da2c1f00ed3b29.exe
    "C:\Users\Admin\AppData\Local\Temp\93b807bedede8dcf32c2a5b4a6232c2d05239376a3c4b90cc1da2c1f00ed3b29.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Users\Admin\AppData\Local\Temp\93b807bedede8dcf32c2a5b4a6232c2d05239376a3c4b90cc1da2c1f00ed3b29.exe
      start
      2⤵
        PID:1628
      • C:\Users\Admin\AppData\Local\Temp\93b807bedede8dcf32c2a5b4a6232c2d05239376a3c4b90cc1da2c1f00ed3b29.exe
        watch
        2⤵
          PID:760

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/760-134-0x0000000000000000-mapping.dmp
      • memory/760-139-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/760-140-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/760-143-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1628-135-0x0000000000000000-mapping.dmp
      • memory/1628-137-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1628-138-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1628-141-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1628-142-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/2260-132-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/2260-133-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/2260-136-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB