Analysis
-
max time kernel
91s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:50
Static task
static1
Behavioral task
behavioral1
Sample
e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe
Resource
win10v2004-20220901-en
General
-
Target
e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe
-
Size
522KB
-
MD5
386d04eae51bf095ba0bf80a989ace10
-
SHA1
7da8302fb6a6356bdf2fa491f2e58ddc4b29f421
-
SHA256
e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23
-
SHA512
9ce095e2751dfd7982c8f5a9de019213670552fbfb14223888ec3f5def278033a0e7d8b1aa34a8c1cd501d02dec475a3f95e49bf9936c31f94bce85e07814c1a
-
SSDEEP
12288:pjgUw1W3a+ELLu5P0W8TdG2wYYlLPt5oKnWq3Ib1:pjT2mFP5PaTdclLPt5/WZ1
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exedescription pid process target process PID 4752 wrote to memory of 1380 4752 e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe PID 4752 wrote to memory of 1380 4752 e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe PID 4752 wrote to memory of 1380 4752 e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe PID 4752 wrote to memory of 1296 4752 e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe PID 4752 wrote to memory of 1296 4752 e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe PID 4752 wrote to memory of 1296 4752 e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe"C:\Users\Admin\AppData\Local\Temp\e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\e67d16453d4a590af4d3b808bfea7276f57819c9a0f53c0833893c9af7007c23.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1296-133-0x0000000000000000-mapping.dmp
-
memory/1296-137-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1296-138-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1296-141-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1380-134-0x0000000000000000-mapping.dmp
-
memory/1380-136-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1380-139-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1380-140-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/4752-132-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/4752-135-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB