Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:46

General

  • Target

    eded876a3d505ecfa9498bcb1df70391a782f90b3fe5c2a5790165a4483329e2.exe

  • Size

    524KB

  • MD5

    6cc797e10e70482064bcd9a3faf53119

  • SHA1

    ed9ffd54a4f32070dabedfa129030109624c9c84

  • SHA256

    eded876a3d505ecfa9498bcb1df70391a782f90b3fe5c2a5790165a4483329e2

  • SHA512

    70c966d320d00aa41696ae6d82a5d6388fa5d4e8ede339b4627daec0decdfbf99bfa9fa7dc8e1c9dfb0eb09d4563a3c6b86244483beb3f2a38fe7383363da883

  • SSDEEP

    12288:bNt+TSnrkC8At8xgQ/n0VzvBVKXCuapzDBG:biT8rkV//0VzvSXCXD

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eded876a3d505ecfa9498bcb1df70391a782f90b3fe5c2a5790165a4483329e2.exe
    "C:\Users\Admin\AppData\Local\Temp\eded876a3d505ecfa9498bcb1df70391a782f90b3fe5c2a5790165a4483329e2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\eded876a3d505ecfa9498bcb1df70391a782f90b3fe5c2a5790165a4483329e2.exe
      tear
      2⤵
        PID:4716

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2220-132-0x0000000000400000-0x000000000048E000-memory.dmp
      Filesize

      568KB

    • memory/2220-133-0x0000000000400000-0x000000000048E000-memory.dmp
      Filesize

      568KB

    • memory/2220-135-0x0000000000400000-0x000000000048E000-memory.dmp
      Filesize

      568KB

    • memory/4716-134-0x0000000000000000-mapping.dmp
    • memory/4716-136-0x0000000000400000-0x000000000048E000-memory.dmp
      Filesize

      568KB

    • memory/4716-137-0x0000000000400000-0x000000000048E000-memory.dmp
      Filesize

      568KB

    • memory/4716-138-0x0000000000400000-0x000000000048E000-memory.dmp
      Filesize

      568KB