Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 14:24

General

  • Target

    499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe

  • Size

    522KB

  • MD5

    40ba0562c821664f065047a20db42610

  • SHA1

    db9cce0b36edd5a9793d3d9c34b39a4fc518033e

  • SHA256

    499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d

  • SHA512

    acda0a70b2e6aac1b0f4e1f7d8b1abdc1fa0b8851eeb72ab5bb95c7101397281c2ba97e84f5b807d6b02fde85b6c57b5aa43180e5f56e8ec8f3f1895898e6bcc

  • SSDEEP

    6144:IVuC+LyMaZgCI7/aQ/fdHn1VJlk0kELSuO2KJK8amQy1CrxQqD9RSaSz+8O5ZH:SFpm7bakHb4lt24K8iy18xQqpx8O5Z

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe
    "C:\Users\Admin\AppData\Local\Temp\499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Users\Admin\AppData\Local\Temp\499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe
      start
      2⤵
        PID:1288
      • C:\Users\Admin\AppData\Local\Temp\499e46c0582f7645e8a7b4774e60106e3b7523168af5c44bab638be8e9e9ff3d.exe
        watch
        2⤵
          PID:1436

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1288-134-0x0000000000000000-mapping.dmp

      • memory/1288-137-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1288-138-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1288-140-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1436-133-0x0000000000000000-mapping.dmp

      • memory/1436-136-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1436-139-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1436-141-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/5048-132-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/5048-135-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB