Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:53

General

  • Target

    7cbf0ec43484b478aa648fe7dcc33b6c5458e206e50d504ba807893011470d48.exe

  • Size

    522KB

  • MD5

    d830c72d937455710e24524fcc5eecc8

  • SHA1

    a23a43900cb079dc4c12bff064da72e34386fd82

  • SHA256

    7cbf0ec43484b478aa648fe7dcc33b6c5458e206e50d504ba807893011470d48

  • SHA512

    0a5c775b26fed0be98c69357ea7acf5299c670c42a2c70f3d77b4e2157c9158b172c94955b8831cdef09518641c5348fee9e10b7b6c59a091f53b041deefaa55

  • SSDEEP

    6144:87J/qhOX/eG4zyJ6soak9Zv6aZXwZYo3mQy1CrxQqD9RSaSz+8O52hdPe:cNTX2w4gC8qXwD9y18xQqpx8O52

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7cbf0ec43484b478aa648fe7dcc33b6c5458e206e50d504ba807893011470d48.exe
    "C:\Users\Admin\AppData\Local\Temp\7cbf0ec43484b478aa648fe7dcc33b6c5458e206e50d504ba807893011470d48.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Local\Temp\7cbf0ec43484b478aa648fe7dcc33b6c5458e206e50d504ba807893011470d48.exe
      start
      2⤵
        PID:2628
      • C:\Users\Admin\AppData\Local\Temp\7cbf0ec43484b478aa648fe7dcc33b6c5458e206e50d504ba807893011470d48.exe
        watch
        2⤵
          PID:4500

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2180-136-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2180-133-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2180-132-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2628-138-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2628-135-0x0000000000000000-mapping.dmp

      • memory/2628-139-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2628-142-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2628-143-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4500-137-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4500-134-0x0000000000000000-mapping.dmp

      • memory/4500-140-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4500-141-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4500-144-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB