Analysis

  • max time kernel
    170s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:34

General

  • Target

    9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exe

  • Size

    524KB

  • MD5

    1ca4117bcc79b5c20ac044465833654b

  • SHA1

    691c65019fd105c6a5c8ebb7ebf2e1df3c2cc1df

  • SHA256

    9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea

  • SHA512

    3703943b1c04e036188ebf2c85efb953cb5f921f1fd123fb85470fcc0f911d1e83904574bf8162c7cbb1f44d9a7b33f862df959f7524f6852fa47663ec3a1c64

  • SSDEEP

    12288:gs0vsZdbMqkMLhX0JcufzCSVzvBVKXCuapzDBG:K2hB0vfznVzvSXCXD

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exe
    "C:\Users\Admin\AppData\Local\Temp\9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3248
    • C:\Users\Admin\AppData\Local\Temp\9af18bc6465b4e4f8b497b88e7ccda34c986a95ac493be6d912b8b9771098dea.exe
      tear
      2⤵
        PID:5104

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3248-132-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/3248-134-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/5104-133-0x0000000000000000-mapping.dmp

    • memory/5104-135-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/5104-136-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/5104-137-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB