Analysis

  • max time kernel
    194s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:35

General

  • Target

    98ee1edd428a01c4a366b37ebffec81b0e74900b53ae493c373e63cb588457f9.exe

  • Size

    526KB

  • MD5

    e3d026cfabf8ab22545539334f3e7608

  • SHA1

    93302142db778df70ecb7dc44f27aead46f2ffd7

  • SHA256

    98ee1edd428a01c4a366b37ebffec81b0e74900b53ae493c373e63cb588457f9

  • SHA512

    75347b1fd90ccd8e28b47b8f31ce56329e564a855270946b6e0e316900ee75434f522e18c5c6c2f08897cca2aede8c2420cffa305ff919a91e68a5c9c1fe3dbd

  • SSDEEP

    12288:IvZfBSRyqTwK9IUc466DmfjW40KgozQ0Ue8MoL6C:S+zwK9wfq4aoMZ9MoL

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98ee1edd428a01c4a366b37ebffec81b0e74900b53ae493c373e63cb588457f9.exe
    "C:\Users\Admin\AppData\Local\Temp\98ee1edd428a01c4a366b37ebffec81b0e74900b53ae493c373e63cb588457f9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3660
    • C:\Users\Admin\AppData\Local\Temp\98ee1edd428a01c4a366b37ebffec81b0e74900b53ae493c373e63cb588457f9.exe
      tear
      2⤵
        PID:3028

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3028-132-0x0000000000000000-mapping.dmp

    • memory/3028-134-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/3028-135-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/3028-136-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/3660-133-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB