Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:35

General

  • Target

    996e155f2deede2f510af72e099bee6a597a3231e79da480e9d48eb75f0a95f5.exe

  • Size

    522KB

  • MD5

    bbd62aa915e79b9c104a29ddf19239b0

  • SHA1

    6a5c2b776430b65480cd51fabec36c03288c9eac

  • SHA256

    996e155f2deede2f510af72e099bee6a597a3231e79da480e9d48eb75f0a95f5

  • SHA512

    a57c78e7a4cfba80c4e38ced1259a1cb3e0cf91204be0604c043a94f198980dfdc8a39ade4cb72dd6968aca60c426efe4e874d8acd8a2ba3aadfe0c79154cd2d

  • SSDEEP

    6144:5xbBxZx8Bk3n6Yj0zHO6OXvAkXTzo7IbLfpJmQy1CrxQqD9RSaSz+8O55CXE:VpY0Z0zHxOIw6Ahy18xQqpx8O55

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\996e155f2deede2f510af72e099bee6a597a3231e79da480e9d48eb75f0a95f5.exe
    "C:\Users\Admin\AppData\Local\Temp\996e155f2deede2f510af72e099bee6a597a3231e79da480e9d48eb75f0a95f5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:520
    • C:\Users\Admin\AppData\Local\Temp\996e155f2deede2f510af72e099bee6a597a3231e79da480e9d48eb75f0a95f5.exe
      start
      2⤵
        PID:4864
      • C:\Users\Admin\AppData\Local\Temp\996e155f2deede2f510af72e099bee6a597a3231e79da480e9d48eb75f0a95f5.exe
        watch
        2⤵
          PID:1700

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/520-132-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/520-133-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/520-136-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1700-134-0x0000000000000000-mapping.dmp
      • memory/1700-137-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1700-139-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1700-141-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4864-135-0x0000000000000000-mapping.dmp
      • memory/4864-138-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4864-140-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB