Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:46
Static task
static1
Behavioral task
behavioral1
Sample
d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exe
Resource
win10v2004-20220901-en
General
-
Target
d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exe
-
Size
522KB
-
MD5
449a50c66863901602f732c11c22bc92
-
SHA1
1d7df0b6e20899f8b84a792ab88664289f2c4d1c
-
SHA256
d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1
-
SHA512
d98db4cc60cf256b99e8976f1fc961a22fe385bb6d714b9bd79fde1da404188fb6d55a1edeff27dcbf997639e054659de373a27ae7aead82a5854fd004afe342
-
SSDEEP
12288:34iKmS0U+BrcsNp+dga7ajgHy18xQqpx8O5W:58+BYs/+d17ajgHatqpx8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exedescription pid process target process PID 2200 wrote to memory of 5072 2200 d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exe d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exe PID 2200 wrote to memory of 5072 2200 d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exe d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exe PID 2200 wrote to memory of 5072 2200 d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exe d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exe PID 2200 wrote to memory of 5060 2200 d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exe d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exe PID 2200 wrote to memory of 5060 2200 d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exe d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exe PID 2200 wrote to memory of 5060 2200 d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exe d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exe"C:\Users\Admin\AppData\Local\Temp\d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exestart2⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\d9487b6553f0ffcd0d07b7532c000a77626282f7c30a4f61a9d4490d41cfb6f1.exewatch2⤵PID:5060
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2200-132-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2200-135-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/5060-133-0x0000000000000000-mapping.dmp
-
memory/5060-136-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/5060-138-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/5060-140-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/5060-142-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/5072-134-0x0000000000000000-mapping.dmp
-
memory/5072-137-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/5072-139-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/5072-141-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB