Analysis

  • max time kernel
    184s
  • max time network
    202s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 15:46

General

  • Target

    23e614f5be2e9489b95b1af21e38b0b32a91d5182a63d180b34c96796b8f5986.exe

  • Size

    75KB

  • MD5

    164beb79e86af019901163c25198a115

  • SHA1

    402b9b13b2390907d6722069e996190ef9bbae20

  • SHA256

    23e614f5be2e9489b95b1af21e38b0b32a91d5182a63d180b34c96796b8f5986

  • SHA512

    7e3549f1fb70662f82327d58d62a272ed8b1e2f28fd99ecca66f25b7f8c961d194a7cec1f5ab3714a70291b2fb5fb20a198484727f6a110a7f80b2d37970b161

  • SSDEEP

    1536:aj8d0cHjiifOBqvUlEhHJ3t4yhOUvwrOSUN9PXKQJBV3L+lfDTw:aj8d0miifO+hHJ3JhOUvwrhUN9Pa4Bkw

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23e614f5be2e9489b95b1af21e38b0b32a91d5182a63d180b34c96796b8f5986.exe
    "C:\Users\Admin\AppData\Local\Temp\23e614f5be2e9489b95b1af21e38b0b32a91d5182a63d180b34c96796b8f5986.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3084
    • C:\Users\Admin\AppData\Local\Temp\23e614f5be2e9489b95b1af21e38b0b32a91d5182a63d180b34c96796b8f5986.exe
      ?
      2⤵
        PID:4112

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4112-133-0x0000000010000000-0x000000001000C000-memory.dmp

      Filesize

      48KB