Analysis

  • max time kernel
    270s
  • max time network
    330s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 14:24

General

  • Target

    495c1137c9da2fbdca3f477e366bd3299704237eeba6cf7c95f8ff341ef02688.exe

  • Size

    533KB

  • MD5

    4e661ee70a45e0352d721df12fcf3ce3

  • SHA1

    fc3dcc938e446aedea59af57aa68b084da577708

  • SHA256

    495c1137c9da2fbdca3f477e366bd3299704237eeba6cf7c95f8ff341ef02688

  • SHA512

    32ccbd3bd06c04f819d32f79f6ee3857ec4f5ba7b4274c57f2378ab0f6c2845beb217359ddad23e96749a4b66085bde5dd9ca8bf15ed2c3e82919fd6a8f23127

  • SSDEEP

    12288:UWvjwWXJ9jfN2xTPJ4HCipx0GLM5ChzQ1RVykejY:UWb5XJ9jfNATJ43px0GLrh01jyF0

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\495c1137c9da2fbdca3f477e366bd3299704237eeba6cf7c95f8ff341ef02688.exe
    "C:\Users\Admin\AppData\Local\Temp\495c1137c9da2fbdca3f477e366bd3299704237eeba6cf7c95f8ff341ef02688.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Users\Admin\AppData\Local\Temp\495c1137c9da2fbdca3f477e366bd3299704237eeba6cf7c95f8ff341ef02688.exe
      tear
      2⤵
        PID:2072

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2072-133-0x0000000000000000-mapping.dmp

    • memory/2072-135-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/2072-136-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/2072-137-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/3516-132-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/3516-134-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB