Analysis

  • max time kernel
    187s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:36

General

  • Target

    fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe

  • Size

    533KB

  • MD5

    a210b3c39a94299cffb2193f5da42c7c

  • SHA1

    9e389d6591c2f2d9c2dcaf0e2548bc843444ec9a

  • SHA256

    fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25

  • SHA512

    861a56a54a23515abced971be33cd03f9d02f23db2a85a8210f4363d5ec82f435f7db4ed381256ede317a9906b40cdae9dae445c296eab1762af3bbd9f774a67

  • SSDEEP

    6144:znIqTgLHwMBW2HL+pmxjU0nNvNOHPQXnj80bVmFXSgOgZGK8JU4yk7owH9OgmBef:zI2gLQPz90NvNMEmNfqJU4bbmRHwzq

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe
    "C:\Users\Admin\AppData\Local\Temp\fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Users\Admin\AppData\Local\Temp\fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe
      tear
      2⤵
        PID:2320

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1896-132-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1896-134-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/2320-133-0x0000000000000000-mapping.dmp

    • memory/2320-135-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/2320-136-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB