Analysis

  • max time kernel
    217s
  • max time network
    222s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 10:21

General

  • Target

    23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exe

  • Size

    525KB

  • MD5

    cb90f9a5283294794566c744c4aea7cb

  • SHA1

    750dbedafd4c75780c0e89ce4e9c742dde882e33

  • SHA256

    23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd

  • SHA512

    db48503f70b95d614c06b778af768182414d145566f84d947c2f927feb40086b9cc4897b4d834996168ad5d95d07b0e0acffcb26bf0b43f6ebd2476fce99e249

  • SSDEEP

    12288:92Z5rDp5wICuTYeqFRgJX9ZalqiV8YG670R:C5rD37YemaslqiV9G0e

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exe
    "C:\Users\Admin\AppData\Local\Temp\23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exe
      watch
      2⤵
        PID:1176
      • C:\Users\Admin\AppData\Local\Temp\23703315437105d79c7c4b68316726de1fae733c68a2dba3f8bd0dede18153bd.exe
        start
        2⤵
          PID:4272

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1176-135-0x0000000000400000-0x000000000048A000-memory.dmp

              Filesize

              552KB

            • memory/1176-138-0x0000000000400000-0x000000000048A000-memory.dmp

              Filesize

              552KB

            • memory/3444-134-0x0000000000400000-0x000000000048A000-memory.dmp

              Filesize

              552KB

            • memory/4272-136-0x0000000000400000-0x000000000048A000-memory.dmp

              Filesize

              552KB

            • memory/4272-137-0x0000000000400000-0x000000000048A000-memory.dmp

              Filesize

              552KB