Analysis

  • max time kernel
    141s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:23

General

  • Target

    16ed4319fae890964742c9d77889c40978a1aede4852b6774846082c350725d6.exe

  • Size

    518KB

  • MD5

    72a7e812398e0d642c3015575142b323

  • SHA1

    8f4e877605a353737769060a38ceef0c792834f7

  • SHA256

    16ed4319fae890964742c9d77889c40978a1aede4852b6774846082c350725d6

  • SHA512

    567de29aa8837c13318c59ca3c896384e354da8a4ca3d66ab1da082b9b65109b769540027ded0a8dabf8a8f366bb03132023beb64532ca003603f27eeb0395be

  • SSDEEP

    12288:A+tQgbPGs8r/WoEbGIy9yZ32X9wYYlLPt5oKnWq3Xbb:XQgbUr+oqyA32alLPt5/Web

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16ed4319fae890964742c9d77889c40978a1aede4852b6774846082c350725d6.exe
    "C:\Users\Admin\AppData\Local\Temp\16ed4319fae890964742c9d77889c40978a1aede4852b6774846082c350725d6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\16ed4319fae890964742c9d77889c40978a1aede4852b6774846082c350725d6.exe
      start
      2⤵
        PID:2792
      • C:\Users\Admin\AppData\Local\Temp\16ed4319fae890964742c9d77889c40978a1aede4852b6774846082c350725d6.exe
        watch
        2⤵
          PID:2800

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2080-137-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/2080-144-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/2792-136-0x0000000000000000-mapping.dmp

      • memory/2792-138-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/2792-140-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/2792-142-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/2800-135-0x0000000000000000-mapping.dmp

      • memory/2800-139-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/2800-141-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/2800-143-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB