Analysis

  • max time kernel
    210s
  • max time network
    214s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:48

General

  • Target

    f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe

  • Size

    522KB

  • MD5

    2b4c599f18657157d4c92f77ff0ba6df

  • SHA1

    d2e49201e3d9c766ea1a1419308d9fb11452d164

  • SHA256

    f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db

  • SHA512

    b60dc13c90e5ddaa9a59919647c0d748bec20ff01682620d082a856d59c99a8b4a37e8f2a21cc6683126a258ec7b3283c4dc603a529d8d46e8b5a47b8bbb9994

  • SSDEEP

    6144:FU9E1zPGNuXaaECgqeN9vPqYfKKD17690Mm8V8CQ1MQ6ibmQy1CrxQqD9RSaSz+W:/zPG0DgiY8kxCJ1qy18xQqpx8O5L

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe
    "C:\Users\Admin\AppData\Local\Temp\f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Users\Admin\AppData\Local\Temp\f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe
      start
      2⤵
        PID:2664
      • C:\Users\Admin\AppData\Local\Temp\f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe
        watch
        2⤵
          PID:4328

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2476-132-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/2476-133-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/2476-136-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/2664-135-0x0000000000000000-mapping.dmp
      • memory/2664-137-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/2664-139-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/2664-141-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/2664-142-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4328-134-0x0000000000000000-mapping.dmp
      • memory/4328-138-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4328-140-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4328-143-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB