Analysis

  • max time kernel
    91s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:50

General

  • Target

    e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe

  • Size

    522KB

  • MD5

    386d04eae51bf095ba0bf80a989ace10

  • SHA1

    7da8302fb6a6356bdf2fa491f2e58ddc4b29f421

  • SHA256

    e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23

  • SHA512

    9ce095e2751dfd7982c8f5a9de019213670552fbfb14223888ec3f5def278033a0e7d8b1aa34a8c1cd501d02dec475a3f95e49bf9936c31f94bce85e07814c1a

  • SSDEEP

    12288:pjgUw1W3a+ELLu5P0W8TdG2wYYlLPt5oKnWq3Ib1:pjT2mFP5PaTdclLPt5/WZ1

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe
    "C:\Users\Admin\AppData\Local\Temp\e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4752
    • C:\Users\Admin\AppData\Local\Temp\e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe
      start
      2⤵
        PID:1380
      • C:\Users\Admin\AppData\Local\Temp\e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe
        watch
        2⤵
          PID:1296

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1296-133-0x0000000000000000-mapping.dmp
      • memory/1296-137-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/1296-138-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/1296-141-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/1380-134-0x0000000000000000-mapping.dmp
      • memory/1380-136-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/1380-139-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/1380-140-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/4752-132-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/4752-135-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB