Analysis

  • max time kernel
    195s
  • max time network
    207s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 14:50

General

  • Target

    1cfd082b073a2797fa305e682f111fe3c5c01f70f6129450aad15c91191ec2de.exe

  • Size

    518KB

  • MD5

    dc5623dbb8bb9f7ef5c1e3e438ccc602

  • SHA1

    d8a302990d05bffdaef37dfd784cc7911095350b

  • SHA256

    1cfd082b073a2797fa305e682f111fe3c5c01f70f6129450aad15c91191ec2de

  • SHA512

    33bbee56c84d8ccc1e143ece22afda8727e85eac2095e4b410215911a37cc5aa7fb9b2f69bde2b89909797e434cf21b7d8bccd75f0d6b563ebc71009bb69def6

  • SSDEEP

    12288:prL5AgtQr+Zs3F9wT5On2EwPUjASES/ya+WJPwTOEn/1:RLrJZWc5ZPuAsz+OPwTvn/

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cfd082b073a2797fa305e682f111fe3c5c01f70f6129450aad15c91191ec2de.exe
    "C:\Users\Admin\AppData\Local\Temp\1cfd082b073a2797fa305e682f111fe3c5c01f70f6129450aad15c91191ec2de.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3860
    • C:\Users\Admin\AppData\Local\Temp\1cfd082b073a2797fa305e682f111fe3c5c01f70f6129450aad15c91191ec2de.exe
      start
      2⤵
        PID:4720
      • C:\Users\Admin\AppData\Local\Temp\1cfd082b073a2797fa305e682f111fe3c5c01f70f6129450aad15c91191ec2de.exe
        watch
        2⤵
          PID:1536

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1536-133-0x0000000000000000-mapping.dmp

      • memory/1536-137-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1536-139-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1536-141-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/3860-132-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/3860-135-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/4720-134-0x0000000000000000-mapping.dmp

      • memory/4720-136-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/4720-138-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/4720-140-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB