Analysis

  • max time kernel
    152s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 14:32

General

  • Target

    3ce66a2b83f5ae36db2ffe06360db2c8f9e234d78adf5a323f152791e11a72da.exe

  • Size

    518KB

  • MD5

    9ecf17846210f45a489943f10639c782

  • SHA1

    72f345a7c49039b6628d566bcc05c5acb8d9a14b

  • SHA256

    3ce66a2b83f5ae36db2ffe06360db2c8f9e234d78adf5a323f152791e11a72da

  • SHA512

    052a13ce2199326760ca537b97979eb3ec6c20b3115e44bc37a402c34f78c4770a2cc1adb2836db2a8a18d9b991aaff36f47b596857acaeed5854123d43b51fd

  • SSDEEP

    12288:pxhW0vDkEDmcNk8ANELiEODwPUjASES/ya+WJPwTOEW/w:hWsDkKL68ANyPuAsz+OPwTvW/

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ce66a2b83f5ae36db2ffe06360db2c8f9e234d78adf5a323f152791e11a72da.exe
    "C:\Users\Admin\AppData\Local\Temp\3ce66a2b83f5ae36db2ffe06360db2c8f9e234d78adf5a323f152791e11a72da.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Users\Admin\AppData\Local\Temp\3ce66a2b83f5ae36db2ffe06360db2c8f9e234d78adf5a323f152791e11a72da.exe
      start
      2⤵
        PID:1692
      • C:\Users\Admin\AppData\Local\Temp\3ce66a2b83f5ae36db2ffe06360db2c8f9e234d78adf5a323f152791e11a72da.exe
        watch
        2⤵
          PID:4760

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1692-134-0x0000000000000000-mapping.dmp

      • memory/1692-136-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1692-138-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/4560-135-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/4560-133-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/4760-132-0x0000000000000000-mapping.dmp

      • memory/4760-137-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/4760-139-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB