Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 14:17

General

  • Target

    5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01.exe

  • Size

    519KB

  • MD5

    6384c0a3d602de59b414229e6ea3575e

  • SHA1

    c17c7f309e7b8bea54b0077899851628180baa21

  • SHA256

    5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01

  • SHA512

    0ddbee4d46ad3d8b4165b1fcedd6144290e16dabff8758e27bdc88b04c69c4874ed467b905bf5c94d144a0ae0aa605608e535d0f7a35a151a2143ffbd0dca6c5

  • SSDEEP

    12288:UtRu0JLWQIfq/QfbU9xFttUd24BWJ6e4gpnO:UboQIrm8d24sJb

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01.exe
    "C:\Users\Admin\AppData\Local\Temp\5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\AppData\Local\Temp\5585a6ad0c584f71dd7ad0c4bce9efd00a6b3065ab30713771d4aad9e7eb0e01.exe
      tear
      2⤵
        PID:3988

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2256-133-0x0000000000400000-0x000000000048B000-memory.dmp

      Filesize

      556KB

    • memory/3988-132-0x0000000000000000-mapping.dmp

    • memory/3988-134-0x0000000000400000-0x000000000048B000-memory.dmp

      Filesize

      556KB

    • memory/3988-135-0x0000000000400000-0x000000000048B000-memory.dmp

      Filesize

      556KB