Analysis

  • max time kernel
    194s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 13:37

General

  • Target

    677a5f11a695b1050ea2c27544e8dcbef3aeef5f1f5bf9b018ceb1d03a1fd40d.exe

  • Size

    533KB

  • MD5

    6c93cfb0c4823968a3fd3ede4848f970

  • SHA1

    54670a7dcfddf0199bc67dde3712fd3f5b9c7833

  • SHA256

    677a5f11a695b1050ea2c27544e8dcbef3aeef5f1f5bf9b018ceb1d03a1fd40d

  • SHA512

    bd1300377f0c13b813aa1af65fd0c789ea1573666906e58ece249e99cda583b4e5ec87cdd2a813c29ed44a23be843929dca84a771b8895ff6c16c517ff55a04f

  • SSDEEP

    12288:c4SWWcfrX7EDbvULAohIlshTYboOmpyGxANG0rH+82wqpbxN:9S7cf0vUL3OlsJBECANnrwpbxN

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\677a5f11a695b1050ea2c27544e8dcbef3aeef5f1f5bf9b018ceb1d03a1fd40d.exe
    "C:\Users\Admin\AppData\Local\Temp\677a5f11a695b1050ea2c27544e8dcbef3aeef5f1f5bf9b018ceb1d03a1fd40d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
      2⤵
        PID:428

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads