Analysis

  • max time kernel
    91s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:42

General

  • Target

    8cf6b7fa7f76f13bfa7ebacf35acc7dc7b5a9ac61df26c0dbd9762a25c171f21.exe

  • Size

    522KB

  • MD5

    2c6bcda63c1d2ce013c8791dfea3aeec

  • SHA1

    0d05d850f3084bcf35589e50ce2ffd70f8b405bd

  • SHA256

    8cf6b7fa7f76f13bfa7ebacf35acc7dc7b5a9ac61df26c0dbd9762a25c171f21

  • SHA512

    68164c92d3cf142a77a17b4415241074dcba769088556f6fabd2f99a7749c189ef03dba8f11c8daeba571d8554e37e39058f0899bc5d5ab2faa7d17b866c4d34

  • SSDEEP

    6144:virKY8qE6hsZVMflQoSA/pnbJnyPKznTFa7pwojfz3ZmQy1CrxQqD9RSaSz+8O5a:ABEaflQoSMnBzKfz7y18xQqpx8O5S

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cf6b7fa7f76f13bfa7ebacf35acc7dc7b5a9ac61df26c0dbd9762a25c171f21.exe
    "C:\Users\Admin\AppData\Local\Temp\8cf6b7fa7f76f13bfa7ebacf35acc7dc7b5a9ac61df26c0dbd9762a25c171f21.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4976
    • C:\Users\Admin\AppData\Local\Temp\8cf6b7fa7f76f13bfa7ebacf35acc7dc7b5a9ac61df26c0dbd9762a25c171f21.exe
      start
      2⤵
        PID:2688
      • C:\Users\Admin\AppData\Local\Temp\8cf6b7fa7f76f13bfa7ebacf35acc7dc7b5a9ac61df26c0dbd9762a25c171f21.exe
        watch
        2⤵
          PID:2148

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2148-133-0x0000000000000000-mapping.dmp

      • memory/2148-136-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2148-138-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2148-140-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2148-143-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2688-134-0x0000000000000000-mapping.dmp

      • memory/2688-137-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2688-139-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2688-141-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2688-142-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4976-132-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4976-135-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB