Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:41
Static task
static1
Behavioral task
behavioral1
Sample
8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe
Resource
win10v2004-20220812-en
General
-
Target
8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe
-
Size
522KB
-
MD5
dc158fa8b12b86d377dd91dfbf50fa4c
-
SHA1
cbcd9fcde52c34ccfec42ed0f7394afac5a347ce
-
SHA256
8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0
-
SHA512
8d29291ff6f7e4004ed133c727511608f9800ee29e51ffdfcd9986c3e22f36017c4d672f3e4ad105e4c9696fd10784ad2f4cddea979872d6c0e362ebc9f62f32
-
SSDEEP
6144:Q1aWZDxohQKwNk7rFmFY9jOX9MpC3UoaqpUxdrZPkTY/210YO9ALuEy+P4hrWZ2E:+aWEZr8WUtSC3FDpwtWsjYO9Atwh
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exedescription pid process target process PID 3700 wrote to memory of 1500 3700 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 3700 wrote to memory of 1500 3700 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 3700 wrote to memory of 1500 3700 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 3700 wrote to memory of 4500 3700 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 3700 wrote to memory of 4500 3700 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 3700 wrote to memory of 4500 3700 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe"C:\Users\Admin\AppData\Local\Temp\8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1500-134-0x0000000000000000-mapping.dmp
-
memory/1500-138-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1500-140-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1500-141-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/3700-132-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/3700-135-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4500-133-0x0000000000000000-mapping.dmp
-
memory/4500-136-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4500-137-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4500-139-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4500-142-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB