Analysis

  • max time kernel
    143s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:39

General

  • Target

    9188942efcc237f820bec885f6968d9e67c9b587adb98434642120ad3781869f.exe

  • Size

    522KB

  • MD5

    67b0324bc55f6335220fe6875b6b2da2

  • SHA1

    c09823f4dc47852468fcff79fae261ebc1440566

  • SHA256

    9188942efcc237f820bec885f6968d9e67c9b587adb98434642120ad3781869f

  • SHA512

    6aa7410fd1ba2da5f8d39ab707d67623dea98eacc2721428fd3b7a2667fd444fba64e2b2c4fc27d5831db8695e731a0ffcb38eccc2bb0b8ec093612da6b560ad

  • SSDEEP

    6144:wPKIQO3laz9MEhewHZ0tCXSzfesIL6TLBa3FUWc5aqpUxdrZPkTY/210YO9ALuEL:Uk2wHvJYNj5DpwtWsjYO9AtwN

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9188942efcc237f820bec885f6968d9e67c9b587adb98434642120ad3781869f.exe
    "C:\Users\Admin\AppData\Local\Temp\9188942efcc237f820bec885f6968d9e67c9b587adb98434642120ad3781869f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Users\Admin\AppData\Local\Temp\9188942efcc237f820bec885f6968d9e67c9b587adb98434642120ad3781869f.exe
      start
      2⤵
        PID:3572
      • C:\Users\Admin\AppData\Local\Temp\9188942efcc237f820bec885f6968d9e67c9b587adb98434642120ad3781869f.exe
        watch
        2⤵
          PID:460

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/460-133-0x0000000000000000-mapping.dmp
      • memory/460-136-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/460-138-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/460-140-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/460-143-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/3572-134-0x0000000000000000-mapping.dmp
      • memory/3572-137-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/3572-139-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/3572-141-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/3572-142-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4456-132-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/4456-135-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB