Analysis
-
max time kernel
174s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:47
Static task
static1
Behavioral task
behavioral1
Sample
ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exe
Resource
win10v2004-20221111-en
General
-
Target
ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exe
-
Size
522KB
-
MD5
9ce8122d2e8da8406028003cbdb4f63c
-
SHA1
7d439bf79bdc6409c9c7400c03446670cc18ad51
-
SHA256
ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c
-
SHA512
81adab05e0efa6854b5268407177683f3b87afcc44e5711ea523e0494021524bbe0b22de9113ddff82c99ed39e86d848f22fa4235578e884a6b9d92a22b722eb
-
SSDEEP
12288:v+DRJDJEo1XgzlPvEm9Xy18xQqpx8O5g:v+DXDJEoKh19atqpx8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exedescription pid process target process PID 4668 wrote to memory of 4016 4668 ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exe ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exe PID 4668 wrote to memory of 4016 4668 ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exe ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exe PID 4668 wrote to memory of 4016 4668 ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exe ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exe PID 4668 wrote to memory of 4960 4668 ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exe ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exe PID 4668 wrote to memory of 4960 4668 ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exe ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exe PID 4668 wrote to memory of 4960 4668 ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exe ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exe"C:\Users\Admin\AppData\Local\Temp\ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\ffe04404234c72ed6b9bfcaac4d49fb27f7cb78314a95ebbecb8e7bb4ab9313c.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4016-134-0x0000000000000000-mapping.dmp
-
memory/4016-137-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4016-139-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4016-141-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4016-142-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4668-132-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4668-135-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4960-133-0x0000000000000000-mapping.dmp
-
memory/4960-136-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4960-138-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4960-140-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4960-143-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB