Analysis

  • max time kernel
    184s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:03

General

  • Target

    8ef4fb89ed9479aff6786673d635d2e1311a9962636d943d73f558741b7945a4.exe

  • Size

    522KB

  • MD5

    627969e60ce9f7a5da3dea3578fc701b

  • SHA1

    d69cccdf221a2bf8b0b6e4bea543ac28bdf909e0

  • SHA256

    8ef4fb89ed9479aff6786673d635d2e1311a9962636d943d73f558741b7945a4

  • SHA512

    c54873dd8c26bc70b93ec4adda0f98740980df4765c95ab72ee2ac7ec90e7294504cde5639aa88b760d643318553ad1f00a9652786e4eae0ffae0d3eb11323e7

  • SSDEEP

    6144:j1UpLgKU5xDGAh8xuzoC+rpwRFy089T8Wjlb7BeuQmQy1CrxQqD9RSaSz+8O5ook:sruGEsu7NDuGM/Bety18xQqpx8O5oU

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ef4fb89ed9479aff6786673d635d2e1311a9962636d943d73f558741b7945a4.exe
    "C:\Users\Admin\AppData\Local\Temp\8ef4fb89ed9479aff6786673d635d2e1311a9962636d943d73f558741b7945a4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Users\Admin\AppData\Local\Temp\8ef4fb89ed9479aff6786673d635d2e1311a9962636d943d73f558741b7945a4.exe
      start
      2⤵
        PID:4492
      • C:\Users\Admin\AppData\Local\Temp\8ef4fb89ed9479aff6786673d635d2e1311a9962636d943d73f558741b7945a4.exe
        watch
        2⤵
          PID:5100

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4492-134-0x0000000000000000-mapping.dmp

      • memory/4492-137-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4492-139-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4492-140-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4764-132-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4764-135-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/5100-133-0x0000000000000000-mapping.dmp

      • memory/5100-136-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/5100-138-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/5100-141-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB