Analysis
-
max time kernel
176s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:13
Static task
static1
Behavioral task
behavioral1
Sample
54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exe
Resource
win10v2004-20220812-en
General
-
Target
54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exe
-
Size
522KB
-
MD5
210dea905cb2f577b23a00ffff11f5aa
-
SHA1
dcda052a5f6d6b7a937d5fedb18ccecd71d3f46d
-
SHA256
54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0
-
SHA512
6a0a958fc177a2fb5d6f8a3f5ddb977f16936084c586530ca916b47481c0e63689560997a40b9679efef778d6bf6f082752f4f39278ba1e590b96e71692b31c6
-
SSDEEP
6144:PPZzzL+M3KRZNSii+9slBBUdwcsV5U4TTEDxkLvmQy1CrxQqD9RSaSz+8O5+O1W:N/+32lBBksVKiuWy18xQqpx8O5+G
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exedescription pid process target process PID 2024 wrote to memory of 1900 2024 54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exe 54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exe PID 2024 wrote to memory of 1900 2024 54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exe 54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exe PID 2024 wrote to memory of 1900 2024 54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exe 54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exe PID 2024 wrote to memory of 4752 2024 54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exe 54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exe PID 2024 wrote to memory of 4752 2024 54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exe 54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exe PID 2024 wrote to memory of 4752 2024 54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exe 54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exe"C:\Users\Admin\AppData\Local\Temp\54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\54582db99a8a8c793a31a5fa7f4fc4288a26e111fd40759561d5451aab3f43e0.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1900-134-0x0000000000000000-mapping.dmp
-
memory/1900-137-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1900-139-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1900-141-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1900-142-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2024-132-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2024-135-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4752-133-0x0000000000000000-mapping.dmp
-
memory/4752-136-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4752-138-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4752-140-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4752-143-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB