Analysis

  • max time kernel
    91s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:04

General

  • Target

    88e3630634e2949bd7e493a8d55b36fc878bca83bc426fbee0d6d9028c8fcfdb.exe

  • Size

    522KB

  • MD5

    89c39cc0c47fd89075c2b87069513f15

  • SHA1

    a0d2ae90c9bbb81a8b29ee5a3dc07625457f562b

  • SHA256

    88e3630634e2949bd7e493a8d55b36fc878bca83bc426fbee0d6d9028c8fcfdb

  • SHA512

    bec84478d8c83292c9104468137ee59136fbe2a2768e24973763de33eecf6adc780d32082d189c39a3d4b5c860a8e335645605b832a99da062b2c608b30df897

  • SSDEEP

    12288:6BXMNtYgT6sp7R2AgRwB5mQy18xQqpx8O5d:6BcfYgesp7R2IiQatqpx8

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88e3630634e2949bd7e493a8d55b36fc878bca83bc426fbee0d6d9028c8fcfdb.exe
    "C:\Users\Admin\AppData\Local\Temp\88e3630634e2949bd7e493a8d55b36fc878bca83bc426fbee0d6d9028c8fcfdb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4752
    • C:\Users\Admin\AppData\Local\Temp\88e3630634e2949bd7e493a8d55b36fc878bca83bc426fbee0d6d9028c8fcfdb.exe
      start
      2⤵
        PID:1456
      • C:\Users\Admin\AppData\Local\Temp\88e3630634e2949bd7e493a8d55b36fc878bca83bc426fbee0d6d9028c8fcfdb.exe
        watch
        2⤵
          PID:4024

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1456-134-0x0000000000000000-mapping.dmp
      • memory/1456-137-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1456-139-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1456-140-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4024-133-0x0000000000000000-mapping.dmp
      • memory/4024-136-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4024-138-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4024-141-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4752-132-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4752-135-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB