Analysis

  • max time kernel
    198s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:11

General

  • Target

    62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe

  • Size

    526KB

  • MD5

    229961a95c1e40dbbc38ed70f44868b3

  • SHA1

    ab104683122b0defbe8e29f700f464011c4a069e

  • SHA256

    62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384

  • SHA512

    513e50ab90c4b1a8060a58775aa3622d23b26488d0885373c79faf7cfda823021b2f356e7db585f1088f0330b50e8be3b0b2a28ed39462eb08b776a8122d1334

  • SSDEEP

    12288:CNFtpambaoGJfA7i+i/HQy18xQqpx8O5lE:CpnmHQatqpx81

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe
    "C:\Users\Admin\AppData\Local\Temp\62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4272
    • C:\Users\Admin\AppData\Local\Temp\62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe
      start
      2⤵
        PID:4520
      • C:\Users\Admin\AppData\Local\Temp\62de26604ac9f6564e1346fe90a81debe51108bbe16ed831f82dec2d7842a384.exe
        watch
        2⤵
          PID:4204

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4204-133-0x0000000000000000-mapping.dmp

      • memory/4204-136-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4204-138-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4204-140-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4204-143-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4272-132-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4272-135-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4520-134-0x0000000000000000-mapping.dmp

      • memory/4520-137-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4520-139-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4520-141-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4520-142-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB