Analysis

  • max time kernel
    190s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:26

General

  • Target

    01099aedc52de2030b88390e4a670c6e143062d795f2cec9c387dd3728e8afec.exe

  • Size

    522KB

  • MD5

    ca37618ddc14f9821a5ac54220a254e4

  • SHA1

    4d3ced51f7d1b5c3a4577066aa4e2560146cbbe9

  • SHA256

    01099aedc52de2030b88390e4a670c6e143062d795f2cec9c387dd3728e8afec

  • SHA512

    92613fdff45a3b3aee7a00c87956afd7dfe89d5072ac04bf3b4739601d7224f29bc7fb63af891a63031837a0a481ca8921e6e512e7ec49a8176af77f9c6a4c0b

  • SSDEEP

    12288:s3erHlzT784ECZu/RM9XNCzxo4xUupSMrFCsNEfF4S7:s3CFztBZ+GXEG4quouFCsNaH7

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01099aedc52de2030b88390e4a670c6e143062d795f2cec9c387dd3728e8afec.exe
    "C:\Users\Admin\AppData\Local\Temp\01099aedc52de2030b88390e4a670c6e143062d795f2cec9c387dd3728e8afec.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Users\Admin\AppData\Local\Temp\01099aedc52de2030b88390e4a670c6e143062d795f2cec9c387dd3728e8afec.exe
      start
      2⤵
        PID:224
      • C:\Users\Admin\AppData\Local\Temp\01099aedc52de2030b88390e4a670c6e143062d795f2cec9c387dd3728e8afec.exe
        watch
        2⤵
          PID:3124

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/224-134-0x0000000000000000-mapping.dmp

      • memory/224-136-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/224-137-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/224-140-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/224-141-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3124-133-0x0000000000000000-mapping.dmp

      • memory/3124-138-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3124-139-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3124-142-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/5096-132-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/5096-135-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB