Analysis

  • max time kernel
    95s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:43

General

  • Target

    8bcebb21e48992d313e09645580d9ad8cdf300c5bbe0f3761050c8fb67309045.exe

  • Size

    524KB

  • MD5

    530138f83765c112afa12fe9af014eb6

  • SHA1

    dedfa8629587549f82b0bc1e8d12a94b32c1b47e

  • SHA256

    8bcebb21e48992d313e09645580d9ad8cdf300c5bbe0f3761050c8fb67309045

  • SHA512

    41f3f30b29ba9aa8fc2bbec9441d5977cae80ff92189c7319b0269d479d2b155bb7a6cadd6b7e958027b6ae753c7c7afd7bd6dd486254cc6e3e528b4edde64d3

  • SSDEEP

    12288:FH+1p8jZMXarzP2N/F4gRAVzvBVKXCuapzDBG:h+esarzeNEVzvSXCXD

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bcebb21e48992d313e09645580d9ad8cdf300c5bbe0f3761050c8fb67309045.exe
    "C:\Users\Admin\AppData\Local\Temp\8bcebb21e48992d313e09645580d9ad8cdf300c5bbe0f3761050c8fb67309045.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:704
    • C:\Users\Admin\AppData\Local\Temp\8bcebb21e48992d313e09645580d9ad8cdf300c5bbe0f3761050c8fb67309045.exe
      tear
      2⤵
        PID:1568

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/704-132-0x0000000000400000-0x000000000048E000-memory.dmp
      Filesize

      568KB

    • memory/704-133-0x0000000000400000-0x000000000048E000-memory.dmp
      Filesize

      568KB

    • memory/704-135-0x0000000000400000-0x000000000048E000-memory.dmp
      Filesize

      568KB

    • memory/1568-134-0x0000000000000000-mapping.dmp
    • memory/1568-136-0x0000000000400000-0x000000000048E000-memory.dmp
      Filesize

      568KB

    • memory/1568-137-0x0000000000400000-0x000000000048E000-memory.dmp
      Filesize

      568KB

    • memory/1568-138-0x0000000000400000-0x000000000048E000-memory.dmp
      Filesize

      568KB

    • memory/1568-139-0x0000000000400000-0x000000000048E000-memory.dmp
      Filesize

      568KB

    • memory/1568-140-0x0000000000400000-0x000000000048E000-memory.dmp
      Filesize

      568KB