Analysis

  • max time kernel
    192s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:28

General

  • Target

    a6af94d880448d335943c84e4a5c4bf593f7c1d71d95e68e4f184a1caaa81721.exe

  • Size

    526KB

  • MD5

    6972b31a1f1eb521ca3241764c73f307

  • SHA1

    5fa14738f2e413a1f26ef142868553556c6414d7

  • SHA256

    a6af94d880448d335943c84e4a5c4bf593f7c1d71d95e68e4f184a1caaa81721

  • SHA512

    4fcfff5bcc24fa70836b5b08a440ee84ef7435816e373a3399a8feb862aeea6383ec18f1ef9fa9fedb1248b5dc4e6f98dfde8fa581875e35429d356bc4f96917

  • SSDEEP

    12288:YhuEp2UB+MCP6L639zJd+AbvhAWjW40KgozQ0Ue8dp:jEp2UB+MCyL6NFdnjPq4aoMZ9dp

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6af94d880448d335943c84e4a5c4bf593f7c1d71d95e68e4f184a1caaa81721.exe
    "C:\Users\Admin\AppData\Local\Temp\a6af94d880448d335943c84e4a5c4bf593f7c1d71d95e68e4f184a1caaa81721.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Users\Admin\AppData\Local\Temp\a6af94d880448d335943c84e4a5c4bf593f7c1d71d95e68e4f184a1caaa81721.exe
      tear
      2⤵
        PID:2084

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2084-132-0x0000000000000000-mapping.dmp
    • memory/2084-134-0x0000000000400000-0x0000000000490000-memory.dmp
      Filesize

      576KB

    • memory/2084-135-0x0000000000400000-0x0000000000490000-memory.dmp
      Filesize

      576KB

    • memory/2084-136-0x0000000000400000-0x0000000000490000-memory.dmp
      Filesize

      576KB

    • memory/2084-137-0x0000000000400000-0x0000000000490000-memory.dmp
      Filesize

      576KB

    • memory/2592-133-0x0000000000400000-0x0000000000490000-memory.dmp
      Filesize

      576KB