Analysis

  • max time kernel
    262s
  • max time network
    279s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 14:08

General

  • Target

    6417eac12d9b193d10153596a8c12a12fddd1c0e671dd578cbe1903d4cc5aa72.exe

  • Size

    522KB

  • MD5

    1fcee0ace9038fecf29aad5725cfc836

  • SHA1

    cb4306d190e66ba111d0f83c92082f3726f87ffa

  • SHA256

    6417eac12d9b193d10153596a8c12a12fddd1c0e671dd578cbe1903d4cc5aa72

  • SHA512

    6aec2cdaf48050eab0b2239690bae6b7a30af25a25d25c5d56ddc2a04a140b551e7ddb521cf594c79993984389fedb516d1ec175e546e01f3f7eda2dce66a45f

  • SSDEEP

    6144:NxhFCvunsg/kShG4PX1qskKn5yrBHObsVdiLllNTjdlAMYQvYsmQy1CrxQqD9RSg:7TFnDkShmKn5yNQP6QZy18xQqpx8O53

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6417eac12d9b193d10153596a8c12a12fddd1c0e671dd578cbe1903d4cc5aa72.exe
    "C:\Users\Admin\AppData\Local\Temp\6417eac12d9b193d10153596a8c12a12fddd1c0e671dd578cbe1903d4cc5aa72.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Users\Admin\AppData\Local\Temp\6417eac12d9b193d10153596a8c12a12fddd1c0e671dd578cbe1903d4cc5aa72.exe
      start
      2⤵
        PID:1192
      • C:\Users\Admin\AppData\Local\Temp\6417eac12d9b193d10153596a8c12a12fddd1c0e671dd578cbe1903d4cc5aa72.exe
        watch
        2⤵
          PID:2776

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1192-135-0x0000000000000000-mapping.dmp

      • memory/1192-138-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1192-140-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1192-141-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2776-134-0x0000000000000000-mapping.dmp

      • memory/2776-137-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2776-139-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2776-142-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2876-132-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2876-133-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2876-136-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB