Analysis
-
max time kernel
157s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:49
Static task
static1
Behavioral task
behavioral1
Sample
e8f5e56e181d0d34bb2dcab6635c5f14e216352532cf59d1c221c813901f4a70.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e8f5e56e181d0d34bb2dcab6635c5f14e216352532cf59d1c221c813901f4a70.exe
Resource
win10v2004-20220812-en
General
-
Target
e8f5e56e181d0d34bb2dcab6635c5f14e216352532cf59d1c221c813901f4a70.exe
-
Size
524KB
-
MD5
71db239a4075b0e8d7a230b445257090
-
SHA1
9ef95be4fb72d3a2510d3cc6e4849f910f903779
-
SHA256
e8f5e56e181d0d34bb2dcab6635c5f14e216352532cf59d1c221c813901f4a70
-
SHA512
862bb886170f21d502be415327d4d660472b7b7b1dd3c870ebebc5f08f2a232f0e7966048c8055704319ea8bacf789b0b32d50e7459f1deb3b1228afa87afe57
-
SSDEEP
12288:c+efX0NxCK4i4pILmVzvBVKXCuapzDBG:9IEOK4+LmVzvSXCXD
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
e8f5e56e181d0d34bb2dcab6635c5f14e216352532cf59d1c221c813901f4a70.exedescription pid process target process PID 2116 wrote to memory of 1728 2116 e8f5e56e181d0d34bb2dcab6635c5f14e216352532cf59d1c221c813901f4a70.exe e8f5e56e181d0d34bb2dcab6635c5f14e216352532cf59d1c221c813901f4a70.exe PID 2116 wrote to memory of 1728 2116 e8f5e56e181d0d34bb2dcab6635c5f14e216352532cf59d1c221c813901f4a70.exe e8f5e56e181d0d34bb2dcab6635c5f14e216352532cf59d1c221c813901f4a70.exe PID 2116 wrote to memory of 1728 2116 e8f5e56e181d0d34bb2dcab6635c5f14e216352532cf59d1c221c813901f4a70.exe e8f5e56e181d0d34bb2dcab6635c5f14e216352532cf59d1c221c813901f4a70.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8f5e56e181d0d34bb2dcab6635c5f14e216352532cf59d1c221c813901f4a70.exe"C:\Users\Admin\AppData\Local\Temp\e8f5e56e181d0d34bb2dcab6635c5f14e216352532cf59d1c221c813901f4a70.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\e8f5e56e181d0d34bb2dcab6635c5f14e216352532cf59d1c221c813901f4a70.exetear2⤵PID:1728
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1728-132-0x0000000000000000-mapping.dmp
-
memory/1728-134-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1728-135-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1728-136-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/2116-133-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB