Analysis

  • max time kernel
    176s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:50

General

  • Target

    e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe

  • Size

    522KB

  • MD5

    416b0d077aecd63b3bba3226e2b09ce6

  • SHA1

    77a87280bba0fc1363b74c9f50d61f056d666e3e

  • SHA256

    e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b

  • SHA512

    34719c14b5c92b496438a2dd201a63facf38ee104e0541daa2274637bdc4b58826e33e78ed31922e7faf4484627d12b0e934f1da4d203d824a36a7923ac39bb2

  • SSDEEP

    6144:WnHWm7WPjIeOP1C2Ef+L5ADznZ6j9b0lqGVWrk7mumQy1CrxQqD9RSaSz+8O59j3:O+rM7XL58Z6hbXGKoy18xQqpx8O59

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe
    "C:\Users\Admin\AppData\Local\Temp\e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Users\Admin\AppData\Local\Temp\e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe
      start
      2⤵
        PID:2516
      • C:\Users\Admin\AppData\Local\Temp\e90f65a385bf4db39b94cd6b216d31697d6b75046c6a3fba0784a6d76455c58b.exe
        watch
        2⤵
          PID:3852

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2516-135-0x0000000000000000-mapping.dmp

      • memory/2516-138-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2516-140-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2516-141-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3852-134-0x0000000000000000-mapping.dmp

      • memory/3852-137-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3852-139-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3852-142-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4612-132-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4612-133-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4612-136-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB