Analysis
-
max time kernel
210s -
max time network
214s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:48
Static task
static1
Behavioral task
behavioral1
Sample
f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe
Resource
win10v2004-20221111-en
General
-
Target
f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe
-
Size
522KB
-
MD5
2b4c599f18657157d4c92f77ff0ba6df
-
SHA1
d2e49201e3d9c766ea1a1419308d9fb11452d164
-
SHA256
f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db
-
SHA512
b60dc13c90e5ddaa9a59919647c0d748bec20ff01682620d082a856d59c99a8b4a37e8f2a21cc6683126a258ec7b3283c4dc603a529d8d46e8b5a47b8bbb9994
-
SSDEEP
6144:FU9E1zPGNuXaaECgqeN9vPqYfKKD17690Mm8V8CQ1MQ6ibmQy1CrxQqD9RSaSz+W:/zPG0DgiY8kxCJ1qy18xQqpx8O5L
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exedescription pid process target process PID 2476 wrote to memory of 2664 2476 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 2476 wrote to memory of 2664 2476 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 2476 wrote to memory of 2664 2476 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 2476 wrote to memory of 4328 2476 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 2476 wrote to memory of 4328 2476 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 2476 wrote to memory of 4328 2476 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe"C:\Users\Admin\AppData\Local\Temp\f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2476-132-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2476-133-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2476-136-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2664-135-0x0000000000000000-mapping.dmp
-
memory/2664-137-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2664-139-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2664-141-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2664-142-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4328-134-0x0000000000000000-mapping.dmp
-
memory/4328-138-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4328-140-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4328-143-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB