Analysis

  • max time kernel
    322s
  • max time network
    366s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:55

General

  • Target

    dd2227953ddcf880e280d0c0fa76c805551301ad59aa0dd645f36c1c68aaee37.exe

  • Size

    522KB

  • MD5

    885f346d6b12b70b006089e61158c9b0

  • SHA1

    1be00129024841744822561a9e243f25f5dea7a8

  • SHA256

    dd2227953ddcf880e280d0c0fa76c805551301ad59aa0dd645f36c1c68aaee37

  • SHA512

    cb3da33b037ebde473d455064af3f09b94b269179f945f9771a68811d4cd15386f7e392ff0733d672193fd58933ce675dbe26330b16ff3146d7f0333edc79b5d

  • SSDEEP

    12288:Z5sA0/j4rS5IXqfBe+2CDpwtWsjYO9AtwtS6:ZaAJrdyU8CrkO9qwZ

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd2227953ddcf880e280d0c0fa76c805551301ad59aa0dd645f36c1c68aaee37.exe
    "C:\Users\Admin\AppData\Local\Temp\dd2227953ddcf880e280d0c0fa76c805551301ad59aa0dd645f36c1c68aaee37.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4188
    • C:\Users\Admin\AppData\Local\Temp\dd2227953ddcf880e280d0c0fa76c805551301ad59aa0dd645f36c1c68aaee37.exe
      start
      2⤵
        PID:3692
      • C:\Users\Admin\AppData\Local\Temp\dd2227953ddcf880e280d0c0fa76c805551301ad59aa0dd645f36c1c68aaee37.exe
        watch
        2⤵
          PID:3820

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3692-135-0x0000000000000000-mapping.dmp

      • memory/3692-138-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3692-140-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3692-141-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3820-134-0x0000000000000000-mapping.dmp

      • memory/3820-137-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3820-139-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3820-142-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4188-132-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4188-133-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4188-136-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB