Analysis

  • max time kernel
    315s
  • max time network
    366s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:52

General

  • Target

    e230acc9e27bbe1706c999282eb0543aee3ba08718a4f4cc6efc2e45d8048447.exe

  • Size

    526KB

  • MD5

    1dd04dd4e573595127a7229ae2e171b0

  • SHA1

    6ee9f1adcca468d2a318b42164c34e523a51ed30

  • SHA256

    e230acc9e27bbe1706c999282eb0543aee3ba08718a4f4cc6efc2e45d8048447

  • SHA512

    a3a2129057635df8a49ebc3459feef694de3b2edb9b8dcb66b2ceb2577ef9e7d6998b1564a58129d17f6ec695c0bd4615b15cf2072f95a48c6ccd06589c95ede

  • SSDEEP

    12288:6Alzn+GOMflB+y3sAWbqajW40KgozQ0Ue8kO:Rzn+PMfWy3sZqaq4aoMZ9kO

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e230acc9e27bbe1706c999282eb0543aee3ba08718a4f4cc6efc2e45d8048447.exe
    "C:\Users\Admin\AppData\Local\Temp\e230acc9e27bbe1706c999282eb0543aee3ba08718a4f4cc6efc2e45d8048447.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3508
    • C:\Users\Admin\AppData\Local\Temp\e230acc9e27bbe1706c999282eb0543aee3ba08718a4f4cc6efc2e45d8048447.exe
      tear
      2⤵
        PID:4664

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3508-133-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/4664-132-0x0000000000000000-mapping.dmp

    • memory/4664-134-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/4664-135-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB