Analysis
-
max time kernel
181s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:27
Static task
static1
Behavioral task
behavioral1
Sample
45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe
Resource
win10v2004-20221111-en
General
-
Target
45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe
-
Size
522KB
-
MD5
5292eca1fbdc8f81a3be0d3534f81d9b
-
SHA1
46a7145cba9fd96cedaf8045516f102efa2fc1b4
-
SHA256
45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2
-
SHA512
6cf89e4d4c394681dab02f807d9d277b883a3ae1a13ad619269dbaa7d97c6cfdac645e3f3c8f2b61a49f10c0f9266088d54a3466acac09ce64b97dc12609e3db
-
SSDEEP
6144:6oX2PEVvmPy2Wz5qFSoulcGpphtjKTQiPdDN0Qn49aYoCmQy1CrxQqD9RSaSz+8d:WNP5SorGvhjydh0iHLqy18xQqpx8O5v
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exedescription pid process target process PID 4448 wrote to memory of 308 4448 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 4448 wrote to memory of 308 4448 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 4448 wrote to memory of 308 4448 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 4448 wrote to memory of 216 4448 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 4448 wrote to memory of 216 4448 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe PID 4448 wrote to memory of 216 4448 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe 45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe"C:\Users\Admin\AppData\Local\Temp\45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\45d7599b640c5a3d30af24e30097b8035bd04c027e1b2705f3672d34926829d2.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/216-134-0x0000000000000000-mapping.dmp
-
memory/216-138-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/216-140-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/216-142-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/308-135-0x0000000000000000-mapping.dmp
-
memory/308-137-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/308-139-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/308-141-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4448-132-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4448-133-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4448-136-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB