Analysis

  • max time kernel
    164s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:09

General

  • Target

    6c0c76cbf13e92963b40d0e2deaf16c57da7c537debb76a2f2758dd6047da846.exe

  • Size

    522KB

  • MD5

    943db88d20ac7fed82b166a62541ae1c

  • SHA1

    d223fecb56370062714a8567dce4a2dafe3f3426

  • SHA256

    6c0c76cbf13e92963b40d0e2deaf16c57da7c537debb76a2f2758dd6047da846

  • SHA512

    b000361d5937e37740bec37ff8eb2c1b4c6216afa54f94ec26d675de0c4339286ea14eb0e2e468cbceada8f6d8c09dea0b5abff3b48ee3b0dc1446d0f891198f

  • SSDEEP

    6144:U9w53x/6p5Y8i/WDm9mIKiqnuw4dwd9C6mHYFUDUYmOJ7e6mQy1CrxQqD9RSaSz9:6Qx/6s6vzHC6mHFyCy18xQqpx8O5zx

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c0c76cbf13e92963b40d0e2deaf16c57da7c537debb76a2f2758dd6047da846.exe
    "C:\Users\Admin\AppData\Local\Temp\6c0c76cbf13e92963b40d0e2deaf16c57da7c537debb76a2f2758dd6047da846.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Users\Admin\AppData\Local\Temp\6c0c76cbf13e92963b40d0e2deaf16c57da7c537debb76a2f2758dd6047da846.exe
      start
      2⤵
        PID:1844
      • C:\Users\Admin\AppData\Local\Temp\6c0c76cbf13e92963b40d0e2deaf16c57da7c537debb76a2f2758dd6047da846.exe
        watch
        2⤵
          PID:3860

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1844-138-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1844-144-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1844-134-0x0000000000000000-mapping.dmp

      • memory/1844-142-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1844-140-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1844-136-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2276-135-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2276-132-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3860-139-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3860-137-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3860-141-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3860-143-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3860-133-0x0000000000000000-mapping.dmp

      • memory/3860-145-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB