Analysis

  • max time kernel
    188s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 14:19

General

  • Target

    52940c3cc0d11c6581265cf77307c6d36f09b193306a514c7d4bbc49ec710bc1.exe

  • Size

    522KB

  • MD5

    925601b8a6e307fcf519b8d910c5a939

  • SHA1

    a131b88b55536d3c36ac30c80c0ae4520f07056a

  • SHA256

    52940c3cc0d11c6581265cf77307c6d36f09b193306a514c7d4bbc49ec710bc1

  • SHA512

    bc8e99cc1116bd4f0e1b0f5aa343e6c39a32fee70845d9482ac0e9944237a00b17be13ed124b8eb0c1e37047610c8f7fb03c23485e87b09c723f99a3a1b8fe21

  • SSDEEP

    6144:DT9aqSyREs/CQM23q16W8tdJhEpL3xOqwr7gUfduq1CDGevOs4ufex7Ng7aqpUxT:HACM3oW8t2/wrZl1UDpwtWsjYO9Atwp

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52940c3cc0d11c6581265cf77307c6d36f09b193306a514c7d4bbc49ec710bc1.exe
    "C:\Users\Admin\AppData\Local\Temp\52940c3cc0d11c6581265cf77307c6d36f09b193306a514c7d4bbc49ec710bc1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:112
    • C:\Users\Admin\AppData\Local\Temp\52940c3cc0d11c6581265cf77307c6d36f09b193306a514c7d4bbc49ec710bc1.exe
      start
      2⤵
        PID:4400
      • C:\Users\Admin\AppData\Local\Temp\52940c3cc0d11c6581265cf77307c6d36f09b193306a514c7d4bbc49ec710bc1.exe
        watch
        2⤵
          PID:4432

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/112-132-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/112-135-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4400-134-0x0000000000000000-mapping.dmp

      • memory/4400-136-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4400-139-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4400-140-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4400-142-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4432-133-0x0000000000000000-mapping.dmp

      • memory/4432-137-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4432-138-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4432-141-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/4432-143-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB