Analysis

  • max time kernel
    177s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 13:01

General

  • Target

    e1f097c77beecbb43ed6a08887f23c3f3017b56697b484b14f190d1ec3950762.exe

  • Size

    503KB

  • MD5

    1db68a3ceba15de88b5d95237cc593b7

  • SHA1

    71b4f3905e2d57854ecb6d6015e95a2926d262ef

  • SHA256

    e1f097c77beecbb43ed6a08887f23c3f3017b56697b484b14f190d1ec3950762

  • SHA512

    8380d7331a9129c2bfe1fb171339c7df04ff52de2b31502e1ed52fb0c0269fbf471a5efd14b8b99a1cbf460a0a973a5ba986f567078f803a617d2c0100771d9d

  • SSDEEP

    6144:CBbucsoeWvdpd5H7ArQ5Fjao5iAUjqpEu0k7JuFdoFURt7t3SScnUKKfp6Er3oiS:CHXH0Mr26MDzk1umW3Svn3Z

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1f097c77beecbb43ed6a08887f23c3f3017b56697b484b14f190d1ec3950762.exe
    "C:\Users\Admin\AppData\Local\Temp\e1f097c77beecbb43ed6a08887f23c3f3017b56697b484b14f190d1ec3950762.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Users\Admin\AppData\Local\Temp\e1f097c77beecbb43ed6a08887f23c3f3017b56697b484b14f190d1ec3950762.exe
      start
      2⤵
        PID:2740
      • C:\Users\Admin\AppData\Local\Temp\e1f097c77beecbb43ed6a08887f23c3f3017b56697b484b14f190d1ec3950762.exe
        watch
        2⤵
          PID:2268

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1424-132-0x0000000000400000-0x0000000000481000-memory.dmp

        Filesize

        516KB

      • memory/1424-135-0x0000000000400000-0x0000000000481000-memory.dmp

        Filesize

        516KB

      • memory/2268-134-0x0000000000000000-mapping.dmp

      • memory/2268-137-0x0000000000400000-0x0000000000481000-memory.dmp

        Filesize

        516KB

      • memory/2268-139-0x0000000000400000-0x0000000000481000-memory.dmp

        Filesize

        516KB

      • memory/2740-133-0x0000000000000000-mapping.dmp

      • memory/2740-136-0x0000000000400000-0x0000000000481000-memory.dmp

        Filesize

        516KB

      • memory/2740-138-0x0000000000400000-0x0000000000481000-memory.dmp

        Filesize

        516KB