Analysis

  • max time kernel
    146s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/11/2022, 23:40

General

  • Target

    e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exe

  • Size

    458KB

  • MD5

    0598f46a672ff04c438013b576a59dcd

  • SHA1

    9aa1bb90580d9370f40845ee605a03ab8ec07b8b

  • SHA256

    e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5

  • SHA512

    fd69a98844d48c91e16ddeed400cddd3300abf06e24503a3826526d8c1ac4469899b4db4ee96a12b073366bebc8959dbccc95edbb242007de74fe4603cba61d5

  • SSDEEP

    12288:2cBgCNvQoIUKEa0MxlBuhkYOJHZgZ12xENpZNe:xgCNvl15MxehzO7hUZe

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exe
    "C:\Users\Admin\AppData\Local\Temp\e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Users\Admin\AppData\Local\Temp\e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exe
      start
      2⤵
        PID:4560
      • C:\Users\Admin\AppData\Local\Temp\e68335b8c9aa57fb200b71a78e5676d8fa7c13e610e759c85140ad7bd16337f5.exe
        watch
        2⤵
          PID:4352

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/620-132-0x0000000000400000-0x0000000000476000-memory.dmp

        Filesize

        472KB

      • memory/620-135-0x0000000000400000-0x0000000000476000-memory.dmp

        Filesize

        472KB

      • memory/4352-136-0x0000000000400000-0x0000000000476000-memory.dmp

        Filesize

        472KB

      • memory/4352-139-0x0000000000400000-0x0000000000476000-memory.dmp

        Filesize

        472KB

      • memory/4560-137-0x0000000000400000-0x0000000000476000-memory.dmp

        Filesize

        472KB

      • memory/4560-138-0x0000000000400000-0x0000000000476000-memory.dmp

        Filesize

        472KB