Analysis

  • max time kernel
    187s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 17:20

General

  • Target

    470c4b744597f2aaa66c5c00253e51532ec56ae404fe0953dfdce4b1b3f1213e.exe

  • Size

    522KB

  • MD5

    3d93261c068203bfee62a82d80779c3e

  • SHA1

    52ebda749c883c9a9977539b61b4a55f40be9e74

  • SHA256

    470c4b744597f2aaa66c5c00253e51532ec56ae404fe0953dfdce4b1b3f1213e

  • SHA512

    eea19dbe665ba645252ea64211d4fde93d6afa3d4d1932e7594d9fe7aa16a1c2966d2d097f2d5c56d31c5e6daabac57de098ac366c6498d8c770e7948a92ff6d

  • SSDEEP

    6144:XdjaQ4LdKyUl58ivpP/1EhqfPApStQo0+zLW4UFWcZQmQy1CrxQqD9RSaSz+8O5R:YEyq58izLKs0WVy18xQqpx8O5Dg

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\470c4b744597f2aaa66c5c00253e51532ec56ae404fe0953dfdce4b1b3f1213e.exe
    "C:\Users\Admin\AppData\Local\Temp\470c4b744597f2aaa66c5c00253e51532ec56ae404fe0953dfdce4b1b3f1213e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\470c4b744597f2aaa66c5c00253e51532ec56ae404fe0953dfdce4b1b3f1213e.exe
      start
      2⤵
        PID:3760
      • C:\Users\Admin\AppData\Local\Temp\470c4b744597f2aaa66c5c00253e51532ec56ae404fe0953dfdce4b1b3f1213e.exe
        watch
        2⤵
          PID:3664

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1192-132-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1192-135-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/3664-133-0x0000000000000000-mapping.dmp
      • memory/3664-137-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/3664-139-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/3664-141-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/3760-134-0x0000000000000000-mapping.dmp
      • memory/3760-136-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/3760-138-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/3760-140-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB