Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:42

General

  • Target

    f472b97359edccc71183ec0a7b95414b19cbedde9375e6f3809877967ffc03ea.exe

  • Size

    522KB

  • MD5

    4fde58463e41de8be721fb79b01ed4e3

  • SHA1

    a834e85ccb4f54e6b21e7779aa1e160eee8c309f

  • SHA256

    f472b97359edccc71183ec0a7b95414b19cbedde9375e6f3809877967ffc03ea

  • SHA512

    9206d7515c6a40dec69579779df114fe5077b9ed5f441ef0e62b392b0ec993da36ae74f19df65a4acf5661339d1d43f10630870fdd2ef353ba29e9ad48927a7b

  • SSDEEP

    12288:rhl0Tg0oBUS5OXAwgJKxmCDpwtWsjYO9AtwC:rhly0TwHBCrkO9qw

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f472b97359edccc71183ec0a7b95414b19cbedde9375e6f3809877967ffc03ea.exe
    "C:\Users\Admin\AppData\Local\Temp\f472b97359edccc71183ec0a7b95414b19cbedde9375e6f3809877967ffc03ea.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Users\Admin\AppData\Local\Temp\f472b97359edccc71183ec0a7b95414b19cbedde9375e6f3809877967ffc03ea.exe
      start
      2⤵
        PID:3748
      • C:\Users\Admin\AppData\Local\Temp\f472b97359edccc71183ec0a7b95414b19cbedde9375e6f3809877967ffc03ea.exe
        watch
        2⤵
          PID:3112

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3112-133-0x0000000000000000-mapping.dmp

      • memory/3112-136-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3112-138-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3112-141-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3748-134-0x0000000000000000-mapping.dmp

      • memory/3748-137-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3748-139-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/3748-140-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4956-132-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4956-135-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB