Analysis

  • max time kernel
    240s
  • max time network
    248s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:49

General

  • Target

    ede772617c39f47ca1061cfb72e47b1dd37f2a7c7cc96cbdbfaef5c0a362575d.exe

  • Size

    522KB

  • MD5

    3a0a6cb86e64c40121a577e53f430bd2

  • SHA1

    151d19a9da3144fed9c98cfb5a437af8eb6f6e46

  • SHA256

    ede772617c39f47ca1061cfb72e47b1dd37f2a7c7cc96cbdbfaef5c0a362575d

  • SHA512

    ca66f3f4ff49e20114c1bb54ccdfe5441e63a4b44ca2bc06cf64bbe2a2182a1033218c9a8da96375cd0931688401e250bc6516fe5cd5249c6c6039ba9fea6dc9

  • SSDEEP

    12288:PEDRx26GiP+ZndHBiAoyy18xQqpx8O58P+:PEDnG9ndHLoyatqpx87+

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ede772617c39f47ca1061cfb72e47b1dd37f2a7c7cc96cbdbfaef5c0a362575d.exe
    "C:\Users\Admin\AppData\Local\Temp\ede772617c39f47ca1061cfb72e47b1dd37f2a7c7cc96cbdbfaef5c0a362575d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3724
    • C:\Users\Admin\AppData\Local\Temp\ede772617c39f47ca1061cfb72e47b1dd37f2a7c7cc96cbdbfaef5c0a362575d.exe
      watch
      2⤵
        PID:5008
      • C:\Users\Admin\AppData\Local\Temp\ede772617c39f47ca1061cfb72e47b1dd37f2a7c7cc96cbdbfaef5c0a362575d.exe
        start
        2⤵
          PID:4892

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3724-133-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/3724-134-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/3724-137-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4892-136-0x0000000000000000-mapping.dmp
      • memory/4892-139-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4892-140-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4892-142-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/5008-135-0x0000000000000000-mapping.dmp
      • memory/5008-138-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/5008-141-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/5008-143-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB