Analysis

  • max time kernel
    294s
  • max time network
    344s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/11/2022, 15:45

General

  • Target

    4a10884468cffd53d29f60055c6f4bcf9659cf4a17c3ef6bd0bc59830a845d94.exe

  • Size

    75KB

  • MD5

    451ef8861af036307666c4c6e570593d

  • SHA1

    e1250c5bae71e4abdbdb48e40915364c8eb50197

  • SHA256

    4a10884468cffd53d29f60055c6f4bcf9659cf4a17c3ef6bd0bc59830a845d94

  • SHA512

    73d3155d905d5cba5ff5da81b83e68fd21ed31c925275ec931d703bf9d0e7cfafd2d36bd469bb024b67c6080e7120b2e89aa740119508967c138fbd9fdc991d8

  • SSDEEP

    1536:Oj8d0iHjiifOBqvUlEhHJ+dNEGm6DjIAJBV3L+lfDTw:Oj8d0AiifO+hHJ+DEGm6ooBkw

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a10884468cffd53d29f60055c6f4bcf9659cf4a17c3ef6bd0bc59830a845d94.exe
    "C:\Users\Admin\AppData\Local\Temp\4a10884468cffd53d29f60055c6f4bcf9659cf4a17c3ef6bd0bc59830a845d94.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Users\Admin\AppData\Local\Temp\4a10884468cffd53d29f60055c6f4bcf9659cf4a17c3ef6bd0bc59830a845d94.exe
      ?
      2⤵
        PID:4768

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4768-133-0x0000000010000000-0x000000001000C000-memory.dmp

            Filesize

            48KB