Analysis

  • max time kernel
    289s
  • max time network
    388s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:16

General

  • Target

    43987ed422c2c250752c2540530c8c7f2559d8105cd530c4fa14d6e21829b1f4.exe

  • Size

    522KB

  • MD5

    5e4c1b2d393b7a066bf7c9c4f34222b6

  • SHA1

    74e0621d6a57eaac219b7ddb46fc6d58f7655511

  • SHA256

    43987ed422c2c250752c2540530c8c7f2559d8105cd530c4fa14d6e21829b1f4

  • SHA512

    26d0b275c2f853abfa59c6d312fe93c3fe11670dc89c4711e4fcfa88ffa5caacf684d748e7ab288e77e0c9924d38e749def82177fb2849359d686a9d04318016

  • SSDEEP

    12288:tc9Y4QplsvVKmja8FWty18xQqpx8O5Ab:+98UvVKm28+atqpx8/

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43987ed422c2c250752c2540530c8c7f2559d8105cd530c4fa14d6e21829b1f4.exe
    "C:\Users\Admin\AppData\Local\Temp\43987ed422c2c250752c2540530c8c7f2559d8105cd530c4fa14d6e21829b1f4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4204
    • C:\Users\Admin\AppData\Local\Temp\43987ed422c2c250752c2540530c8c7f2559d8105cd530c4fa14d6e21829b1f4.exe
      start
      2⤵
        PID:3996
      • C:\Users\Admin\AppData\Local\Temp\43987ed422c2c250752c2540530c8c7f2559d8105cd530c4fa14d6e21829b1f4.exe
        watch
        2⤵
          PID:1544

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1544-134-0x0000000000000000-mapping.dmp

      • memory/1544-137-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1544-139-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3996-135-0x0000000000000000-mapping.dmp

      • memory/3996-138-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3996-140-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4204-132-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4204-133-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4204-136-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB