Analysis

  • max time kernel
    91s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 13:40

General

  • Target

    d5db842332e39423776748e86805984d08ebf92585a469a666d16c30d347ce58.exe

  • Size

    571KB

  • MD5

    eb4d9c63dbd3c4846027805f9c0b3eb8

  • SHA1

    190eb9f3e1aa73bd9ad7e2ac0f149e0aeb15d59f

  • SHA256

    d5db842332e39423776748e86805984d08ebf92585a469a666d16c30d347ce58

  • SHA512

    c80c0972060262bc747aab3e820da8bddfb8530da3efb67f548d729b4dc8ac40a0e5396cd86ed35accedb1c1a6c0a8a5b33e3ec81f014f2a6343a41b54ca474f

  • SSDEEP

    12288:mYcJ8USOzh7WbXTVmamdhxYSGDg6PIbib:c8YGDVodhuSylPIu

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5db842332e39423776748e86805984d08ebf92585a469a666d16c30d347ce58.exe
    "C:\Users\Admin\AppData\Local\Temp\d5db842332e39423776748e86805984d08ebf92585a469a666d16c30d347ce58.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4976
    • C:\Users\Admin\AppData\Local\Temp\d5db842332e39423776748e86805984d08ebf92585a469a666d16c30d347ce58.exe
      start
      2⤵
        PID:4312
      • C:\Users\Admin\AppData\Local\Temp\d5db842332e39423776748e86805984d08ebf92585a469a666d16c30d347ce58.exe
        watch
        2⤵
          PID:4996

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4312-133-0x0000000000000000-mapping.dmp

      • memory/4312-138-0x0000000005000000-0x0000000005060000-memory.dmp

        Filesize

        384KB

      • memory/4312-139-0x0000000005000000-0x0000000005060000-memory.dmp

        Filesize

        384KB

      • memory/4976-135-0x0000000005000000-0x0000000005060000-memory.dmp

        Filesize

        384KB

      • memory/4976-134-0x0000000000400000-0x0000000000493000-memory.dmp

        Filesize

        588KB

      • memory/4996-132-0x0000000000000000-mapping.dmp

      • memory/4996-136-0x0000000000400000-0x0000000000493000-memory.dmp

        Filesize

        588KB

      • memory/4996-137-0x0000000005000000-0x0000000005060000-memory.dmp

        Filesize

        384KB

      • memory/4996-140-0x0000000005000000-0x0000000005060000-memory.dmp

        Filesize

        384KB