Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:50
Static task
static1
Behavioral task
behavioral1
Sample
ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exe
Resource
win10v2004-20220812-en
General
-
Target
ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exe
-
Size
522KB
-
MD5
9f5136862a4455fa807b2ad8eab8cea2
-
SHA1
1dfdb0863b598932c30520b9be83d13d89c6a24d
-
SHA256
ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64
-
SHA512
96dd1b431b7e4fa2dec83df79a0e1e0d5f1eb464a032be12ab6600ee96c19d2d27cd568eee7043b06d5de2e72a73c8007537a95929d456f87b0e29e1e5ba4e53
-
SSDEEP
12288:yFFBxjfuTiZ9vJ0P6g99jy18xQqpx8O57:yFbx7uTiZ1J0P6g/atqpx8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exedescription pid process target process PID 3012 wrote to memory of 4968 3012 ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exe ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exe PID 3012 wrote to memory of 4968 3012 ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exe ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exe PID 3012 wrote to memory of 4968 3012 ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exe ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exe PID 3012 wrote to memory of 4952 3012 ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exe ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exe PID 3012 wrote to memory of 4952 3012 ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exe ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exe PID 3012 wrote to memory of 4952 3012 ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exe ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exe"C:\Users\Admin\AppData\Local\Temp\ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\ea1b76e4da918dce06ac5b487be012d381578c71108315becd3f07d70ba10c64.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3012-135-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/3012-132-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4952-138-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4952-136-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4952-133-0x0000000000000000-mapping.dmp
-
memory/4952-140-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4952-144-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4968-134-0x0000000000000000-mapping.dmp
-
memory/4968-137-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4968-139-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4968-141-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4968-142-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4968-143-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB