Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:51
Static task
static1
Behavioral task
behavioral1
Sample
e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exe
Resource
win10v2004-20220901-en
General
-
Target
e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exe
-
Size
518KB
-
MD5
05e3be3707de79426841694c046ec179
-
SHA1
6499cf20395ace76071108748d7ef8f7824a4811
-
SHA256
e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c
-
SHA512
9034aaf425d879c074cb1499ceccc5ecfdb89b83bedc1d72d642c1bbe795c3ba2dc4b7000e484fe46b577301406faaf08932d92cb7d9ea261ae7371124c029d5
-
SSDEEP
12288:bjIRNYNOuUxUZItvTbR9wYYlLPt5oKnWq3Erb:wRiNsaKTbElLPt5/WHn
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exedescription pid process target process PID 4880 wrote to memory of 812 4880 e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exe e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exe PID 4880 wrote to memory of 812 4880 e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exe e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exe PID 4880 wrote to memory of 812 4880 e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exe e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exe PID 4880 wrote to memory of 2704 4880 e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exe e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exe PID 4880 wrote to memory of 2704 4880 e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exe e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exe PID 4880 wrote to memory of 2704 4880 e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exe e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exe"C:\Users\Admin\AppData\Local\Temp\e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exestart2⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\e11d0a8cb1f7412222951a48d87bade7aa69acac0d2ff381d29a9c2b7fdfad8c.exewatch2⤵PID:2704
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/812-134-0x0000000000000000-mapping.dmp
-
memory/812-137-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/812-139-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/812-140-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2704-133-0x0000000000000000-mapping.dmp
-
memory/2704-136-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2704-138-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2704-141-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/4880-132-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/4880-135-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB