Analysis

  • max time kernel
    188s
  • max time network
    204s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:02

General

  • Target

    d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe

  • Size

    524KB

  • MD5

    fa498417960cbedd8f5a00e6b0b3e198

  • SHA1

    04b2328016fd5fe169fc16975cc0410469f0de21

  • SHA256

    d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327

  • SHA512

    503dd5e4fd8f4ed9952665f76b1ea234a7f9604133640c10db87feab81e1caf54fe5e491ea66297dfd7212f759657529f716598ecba97643d9150ea9a31451bc

  • SSDEEP

    12288:0k/cy/pFFi/2WIqAuq3d1/Wv4bON/uL63PTb/g0OJp/Zbj:b/c+WTc1eOy/uE/QfxX

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe
    "C:\Users\Admin\AppData\Local\Temp\d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Users\Admin\AppData\Local\Temp\d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe
      start
      2⤵
        PID:3780
      • C:\Users\Admin\AppData\Local\Temp\d286f8574d18ea4a49e34b3e01e73611782da5655f03775857d75aa1283ef327.exe
        watch
        2⤵
          PID:4848

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3780-134-0x0000000000000000-mapping.dmp

      • memory/3780-136-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3780-138-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3780-139-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4260-132-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4260-135-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4848-133-0x0000000000000000-mapping.dmp

      • memory/4848-137-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4848-140-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB