Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:02
Static task
static1
Behavioral task
behavioral1
Sample
eb56d24d80edee73e794d2895f987ebc652baace0c25020ba39414a17941a6bd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb56d24d80edee73e794d2895f987ebc652baace0c25020ba39414a17941a6bd.exe
Resource
win10v2004-20220812-en
General
-
Target
eb56d24d80edee73e794d2895f987ebc652baace0c25020ba39414a17941a6bd.exe
-
Size
166KB
-
MD5
fd39d553cf2d300696a61d4215e7c342
-
SHA1
86a6e4e845153303c552ca54e38c8cb10d0b58f6
-
SHA256
eb56d24d80edee73e794d2895f987ebc652baace0c25020ba39414a17941a6bd
-
SHA512
d89254ce35b50f6a6128b15698de1bedee34a0758cfc7f150dd46eb313cacf36ee793b4c46ddbc032194f66510f710f20f270a6e2aaf37db2b174a4a74c4039b
-
SSDEEP
1536:ORjHZewPG8UHSVkfDy4fOJJr1T7Y08m6Zu0eU4ptqwgWStiChQ9G1dGJBu:KkwxWAfr1/KbeU4bKtifCau
Malware Config
Signatures
-
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
eb56d24d80edee73e794d2895f987ebc652baace0c25020ba39414a17941a6bd.exepid process 4460 eb56d24d80edee73e794d2895f987ebc652baace0c25020ba39414a17941a6bd.exe 4460 eb56d24d80edee73e794d2895f987ebc652baace0c25020ba39414a17941a6bd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
eb56d24d80edee73e794d2895f987ebc652baace0c25020ba39414a17941a6bd.exedescription pid process target process PID 4460 wrote to memory of 4348 4460 eb56d24d80edee73e794d2895f987ebc652baace0c25020ba39414a17941a6bd.exe svchost.exe PID 4460 wrote to memory of 4348 4460 eb56d24d80edee73e794d2895f987ebc652baace0c25020ba39414a17941a6bd.exe svchost.exe PID 4460 wrote to memory of 4348 4460 eb56d24d80edee73e794d2895f987ebc652baace0c25020ba39414a17941a6bd.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb56d24d80edee73e794d2895f987ebc652baace0c25020ba39414a17941a6bd.exe"C:\Users\Admin\AppData\Local\Temp\eb56d24d80edee73e794d2895f987ebc652baace0c25020ba39414a17941a6bd.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:4348
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4348-132-0x0000000000000000-mapping.dmp
-
memory/4348-135-0x00000000008E0000-0x00000000008EE000-memory.dmpFilesize
56KB
-
memory/4348-136-0x00000000001A0000-0x00000000001B1000-memory.dmpFilesize
68KB
-
memory/4348-138-0x0000000000970000-0x00000000009F0000-memory.dmpFilesize
512KB
-
memory/4460-133-0x00000000006E0000-0x00000000006FC000-memory.dmpFilesize
112KB
-
memory/4460-134-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4460-137-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB