Analysis

  • max time kernel
    76s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:31

General

  • Target

    a09bbea1fcfa191037f14c95871bd8fe5f4904d55add0f76a7810c2b2b49b41e.exe

  • Size

    532KB

  • MD5

    3570ea449c1734c2e854b43b1ae6b1fc

  • SHA1

    6270fbe0b4e41c416470af738187ec223c6dd4c0

  • SHA256

    a09bbea1fcfa191037f14c95871bd8fe5f4904d55add0f76a7810c2b2b49b41e

  • SHA512

    2cfa3892ccb8067a3e05e7befe66c6ac2e9b7aa393c7630afbad893614ec95c47c79dc4bb70109c9ef6f2b6f7ea0e35fe901bac2c7016bfe7ab282edf5000263

  • SSDEEP

    12288:qRu53HJWVzKBVSYDFIPh2RIbWcoIFFEgB9nP1vA:qROHJWUTScFIp0IbWcoIFagbPNA

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a09bbea1fcfa191037f14c95871bd8fe5f4904d55add0f76a7810c2b2b49b41e.exe
    "C:\Users\Admin\AppData\Local\Temp\a09bbea1fcfa191037f14c95871bd8fe5f4904d55add0f76a7810c2b2b49b41e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4964
    • C:\Users\Admin\AppData\Local\Temp\a09bbea1fcfa191037f14c95871bd8fe5f4904d55add0f76a7810c2b2b49b41e.exe
      tear
      2⤵
        PID:4648

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4648-135-0x0000000000000000-mapping.dmp

    • memory/4648-137-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/4648-138-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/4964-136-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB