Analysis

  • max time kernel
    175s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:52

General

  • Target

    e2516b37b67a8f566bd4623b805255f2c87f061e7bf4ce38f0a505ce39ae8d51.exe

  • Size

    526KB

  • MD5

    2c41ab7f903e59231efb3c57c3b72afa

  • SHA1

    c872123a28749a49c1308162932749579b355dba

  • SHA256

    e2516b37b67a8f566bd4623b805255f2c87f061e7bf4ce38f0a505ce39ae8d51

  • SHA512

    3e40a0aa2960979ec0572815458661e99e93dd0ac32c738b4b6bccedf9f58c0277824aba67b11a2a4acaf44e8abd86f792114a1e3edc325ecca05501961d7ea0

  • SSDEEP

    6144:4j1Z9oQaDOcNxOneta5BDY0eErKMYDj2rXfKzQvRKjWpkx0K+DKIFdGx3DQC48H+:SZ+SpjPveiYO38jW40KgozQ0Ue819c

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2516b37b67a8f566bd4623b805255f2c87f061e7bf4ce38f0a505ce39ae8d51.exe
    "C:\Users\Admin\AppData\Local\Temp\e2516b37b67a8f566bd4623b805255f2c87f061e7bf4ce38f0a505ce39ae8d51.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:668
    • C:\Users\Admin\AppData\Local\Temp\e2516b37b67a8f566bd4623b805255f2c87f061e7bf4ce38f0a505ce39ae8d51.exe
      tear
      2⤵
        PID:1804

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/668-133-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1804-132-0x0000000000000000-mapping.dmp

    • memory/1804-134-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1804-135-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB