Analysis

  • max time kernel
    148s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:49

General

  • Target

    ea76cb2306a143ca3ffb48d305340c6d71cb651da31dbe3edf1f26b4638352e4.exe

  • Size

    522KB

  • MD5

    b7369110e519485d5b379a6996b7541b

  • SHA1

    0b8d03daf3da344d179892fcac525b6916506df3

  • SHA256

    ea76cb2306a143ca3ffb48d305340c6d71cb651da31dbe3edf1f26b4638352e4

  • SHA512

    bb8e2a8dd01fc6c2d7ccb65b823b2f7c47c86263e1f29c1d5a47b8270bfedc428d506a8fed97d07cb38dc6231cca367fc2154ebdc7cc54dfdc1dffabfa61d4be

  • SSDEEP

    6144:cUiVUXXn15PnRRFrDN8L4nOvmYrO+KUMgnuqJZMHHrNpMmQy1CrxQqD9RSaSz+82:ZTRRFqLEOvsUMKwEy18xQqpx8O5Za3

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea76cb2306a143ca3ffb48d305340c6d71cb651da31dbe3edf1f26b4638352e4.exe
    "C:\Users\Admin\AppData\Local\Temp\ea76cb2306a143ca3ffb48d305340c6d71cb651da31dbe3edf1f26b4638352e4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Users\Admin\AppData\Local\Temp\ea76cb2306a143ca3ffb48d305340c6d71cb651da31dbe3edf1f26b4638352e4.exe
      start
      2⤵
        PID:3540
      • C:\Users\Admin\AppData\Local\Temp\ea76cb2306a143ca3ffb48d305340c6d71cb651da31dbe3edf1f26b4638352e4.exe
        watch
        2⤵
          PID:1808

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1808-133-0x0000000000000000-mapping.dmp

      • memory/1808-136-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1808-138-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1808-141-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3540-134-0x0000000000000000-mapping.dmp

      • memory/3540-137-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3540-139-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3540-140-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4972-132-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4972-135-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB