Analysis

  • max time kernel
    91s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 16:03

General

  • Target

    bc8587d848d85cb3489dc5ddf934fef988672bb42eaf6c126b0a4d2f894de769.exe

  • Size

    521KB

  • MD5

    bb3e0d1b699f2ff226ebb5eb0c9e80f4

  • SHA1

    e8bf214646ba5b3f6693225267441355c29db5bb

  • SHA256

    bc8587d848d85cb3489dc5ddf934fef988672bb42eaf6c126b0a4d2f894de769

  • SHA512

    0dfd79d7a95a5d58571ba1793047861c0be5f3b31375d5ab165f06abb5de5f8bf0a01c49b376ccb756780f968b620c73e5d4c55b7e08ebcf7d95b3c68d8d2e1b

  • SSDEEP

    6144:rVBVTsJU7gjjZUXSmfo/O39p+n6R2xdWcnmiv6z117IyjjtahRv3Sg8Gf8yRtD3f:rfVQJruChb6qv6zbIejGexGWRLUSb

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc8587d848d85cb3489dc5ddf934fef988672bb42eaf6c126b0a4d2f894de769.exe
    "C:\Users\Admin\AppData\Local\Temp\bc8587d848d85cb3489dc5ddf934fef988672bb42eaf6c126b0a4d2f894de769.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Local\Temp\bc8587d848d85cb3489dc5ddf934fef988672bb42eaf6c126b0a4d2f894de769.exe
      start
      2⤵
        PID:4756
      • C:\Users\Admin\AppData\Local\Temp\bc8587d848d85cb3489dc5ddf934fef988672bb42eaf6c126b0a4d2f894de769.exe
        watch
        2⤵
          PID:5004

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2232-132-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/2232-135-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/4756-134-0x0000000000000000-mapping.dmp

      • memory/4756-137-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/4756-138-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/5004-133-0x0000000000000000-mapping.dmp

      • memory/5004-136-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/5004-139-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB