Analysis

  • max time kernel
    91s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:14

General

  • Target

    507f0f14c2419084632fd3b4c8ef2a4c30dd17b7b5f7e826ad982cea3f60ee88.exe

  • Size

    526KB

  • MD5

    bc76cc10ba40a696fa87582b4045534f

  • SHA1

    19c9424cbd96685f0aad37219ae1f7b1810bae8c

  • SHA256

    507f0f14c2419084632fd3b4c8ef2a4c30dd17b7b5f7e826ad982cea3f60ee88

  • SHA512

    26a3affe3a74cbd2dc23be1171a896d0bda168fab43b4b246d7ad9830bf8d9a0a5757722c381c0e1a80fcc44c63598fe616f27e8836282eb2f65bb00b39a44bc

  • SSDEEP

    12288:1QqGKMIWLtO+rc0hfcmYy18xQqpx8O5GV:qqpMIWHrc0umYatqpx8b

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\507f0f14c2419084632fd3b4c8ef2a4c30dd17b7b5f7e826ad982cea3f60ee88.exe
    "C:\Users\Admin\AppData\Local\Temp\507f0f14c2419084632fd3b4c8ef2a4c30dd17b7b5f7e826ad982cea3f60ee88.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4308
    • C:\Users\Admin\AppData\Local\Temp\507f0f14c2419084632fd3b4c8ef2a4c30dd17b7b5f7e826ad982cea3f60ee88.exe
      tear
      2⤵
        PID:4940

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4308-132-0x0000000000400000-0x000000000048C000-memory.dmp

      Filesize

      560KB

    • memory/4308-134-0x0000000000400000-0x000000000048C000-memory.dmp

      Filesize

      560KB

    • memory/4940-133-0x0000000000000000-mapping.dmp

    • memory/4940-135-0x0000000000400000-0x000000000048C000-memory.dmp

      Filesize

      560KB

    • memory/4940-136-0x0000000000400000-0x000000000048C000-memory.dmp

      Filesize

      560KB

    • memory/4940-137-0x0000000000400000-0x000000000048C000-memory.dmp

      Filesize

      560KB