Analysis

  • max time kernel
    166s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:11

General

  • Target

    41bd07a5dade9b20e685ec0661be44dc13e6d9dd3773f1dcc94f2bef9388e9ac.exe

  • Size

    521KB

  • MD5

    8bdfeaebd147337b9cb9a6825b67073b

  • SHA1

    6fdcbb9f2541a52ce4e631ba0e24123217c631ee

  • SHA256

    41bd07a5dade9b20e685ec0661be44dc13e6d9dd3773f1dcc94f2bef9388e9ac

  • SHA512

    82d29b523e0346ba0dae501753b00dd4789b66c8aa8d7a98d9a5d8e53a80476eb2cdbddfb4b077c3985072b7f1f0aa69f9629f4e1fa2407d3eee497ce3158665

  • SSDEEP

    12288:goRQ8kHqrMqi/zpGUASCF+FGcqDLRB3dUEJQhGfRIDo+0jp6Qkrn:goRVk261GUASCIIcqXNUE/SY

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41bd07a5dade9b20e685ec0661be44dc13e6d9dd3773f1dcc94f2bef9388e9ac.exe
    "C:\Users\Admin\AppData\Local\Temp\41bd07a5dade9b20e685ec0661be44dc13e6d9dd3773f1dcc94f2bef9388e9ac.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3548
    • C:\Users\Admin\AppData\Local\Temp\41bd07a5dade9b20e685ec0661be44dc13e6d9dd3773f1dcc94f2bef9388e9ac.exe
      start
      2⤵
        PID:520
      • C:\Users\Admin\AppData\Local\Temp\41bd07a5dade9b20e685ec0661be44dc13e6d9dd3773f1dcc94f2bef9388e9ac.exe
        watch
        2⤵
          PID:4200

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/520-133-0x0000000000000000-mapping.dmp

      • memory/520-136-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/520-137-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/520-139-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3548-134-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4200-132-0x0000000000000000-mapping.dmp

      • memory/4200-135-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4200-138-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4200-140-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB