Analysis

  • max time kernel
    138s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 17:10

General

  • Target

    56f28bb91e7e8e700d3f32e11d40282e4dc394336d9c981d5e3cb7effd7b4bcc.exe

  • Size

    529KB

  • MD5

    485b3e8c7f21e399135e7394d9488490

  • SHA1

    b00a7d71f1f133c7f85d1f7e6b8e1284e3f8216e

  • SHA256

    56f28bb91e7e8e700d3f32e11d40282e4dc394336d9c981d5e3cb7effd7b4bcc

  • SHA512

    3bdb369de8bfe3d420eb78db49928306d14474dac67d73c7ec6de6c450ce8332dbfa807a902745164a929c6097a5d120a9c16c19b739f87a3ee672f0d1e8c409

  • SSDEEP

    12288:UCkjNO39B+nFwe2EdMwTVjRJ49dFgaKfHcbvwhO:UCk09Xe2iV1S9dcfHavww

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56f28bb91e7e8e700d3f32e11d40282e4dc394336d9c981d5e3cb7effd7b4bcc.exe
    "C:\Users\Admin\AppData\Local\Temp\56f28bb91e7e8e700d3f32e11d40282e4dc394336d9c981d5e3cb7effd7b4bcc.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\Users\Admin\AppData\Local\Temp\56f28bb91e7e8e700d3f32e11d40282e4dc394336d9c981d5e3cb7effd7b4bcc.exe
      start
      2⤵
        PID:2256
      • C:\Users\Admin\AppData\Local\Temp\56f28bb91e7e8e700d3f32e11d40282e4dc394336d9c981d5e3cb7effd7b4bcc.exe
        watch
        2⤵
          PID:916

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/916-132-0x0000000000000000-mapping.dmp

      • memory/916-136-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/916-139-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2256-133-0x0000000000000000-mapping.dmp

      • memory/2256-135-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2256-137-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2256-138-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/3700-134-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB