Analysis

  • max time kernel
    184s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:05

General

  • Target

    81d9b44b4290b2a955c511c7801bacee0beb1fd230ea2e74331b5e96aaece0ff.exe

  • Size

    526KB

  • MD5

    ca6e08a207972348115fb359132ead0e

  • SHA1

    f1dbf085d349e95847285ba59b95563e9f4ef61c

  • SHA256

    81d9b44b4290b2a955c511c7801bacee0beb1fd230ea2e74331b5e96aaece0ff

  • SHA512

    4416cca8efe72f932b8d31bead38da893acb6ca4c72a84e4c2635f79f4555265ace87ec8deba61236d8e6bc1db87d7e8cb5e0cf9892c033e3e948c6d68399239

  • SSDEEP

    6144:NYd2cX2C5vEVHfU/voMu8a9U0iE4vbUZ1Y1mQy1CrxQqD9RSaSz+8O5qMv:/cXd68O1zwC23y18xQqpx8O5qu

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81d9b44b4290b2a955c511c7801bacee0beb1fd230ea2e74331b5e96aaece0ff.exe
    "C:\Users\Admin\AppData\Local\Temp\81d9b44b4290b2a955c511c7801bacee0beb1fd230ea2e74331b5e96aaece0ff.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3136
    • C:\Users\Admin\AppData\Local\Temp\81d9b44b4290b2a955c511c7801bacee0beb1fd230ea2e74331b5e96aaece0ff.exe
      watch
      2⤵
        PID:4460
      • C:\Users\Admin\AppData\Local\Temp\81d9b44b4290b2a955c511c7801bacee0beb1fd230ea2e74331b5e96aaece0ff.exe
        start
        2⤵
          PID:4312

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3136-132-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3136-135-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3136-136-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4312-134-0x0000000000000000-mapping.dmp

      • memory/4312-138-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4312-140-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4312-141-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4460-133-0x0000000000000000-mapping.dmp

      • memory/4460-137-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4460-139-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4460-142-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB