Analysis

  • max time kernel
    185s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 14:56

General

  • Target

    cf1b55aa175ce7f30e9f3299967da85f74f57435dcd47989573b587f66800c92.exe

  • Size

    488KB

  • MD5

    e9c4c5522347e4ff7e1c5add98a276a4

  • SHA1

    b4a407f84f79c688afd8eb288152b9f77853aea1

  • SHA256

    cf1b55aa175ce7f30e9f3299967da85f74f57435dcd47989573b587f66800c92

  • SHA512

    860c672cc3dc3486c9666dc3da83e09e14625c574ee7a066aaea88a60cbc7b34f9d170567d39f99f4ba3e29a201823cc66985a3a99e4ccd07a31f07a040ae2e8

  • SSDEEP

    6144:sAcYM79a5er0Z+Jf3T6ViVYBjl5MfODlV8oizbPDtsToRkovCvIdn+iudYAMpxkA:6Yi6ewgOVvDmzP26ktXeAMpxkRtDc

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf1b55aa175ce7f30e9f3299967da85f74f57435dcd47989573b587f66800c92.exe
    "C:\Users\Admin\AppData\Local\Temp\cf1b55aa175ce7f30e9f3299967da85f74f57435dcd47989573b587f66800c92.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Users\Admin\AppData\Local\Temp\cf1b55aa175ce7f30e9f3299967da85f74f57435dcd47989573b587f66800c92.exe
      start
      2⤵
        PID:4944
      • C:\Users\Admin\AppData\Local\Temp\cf1b55aa175ce7f30e9f3299967da85f74f57435dcd47989573b587f66800c92.exe
        watch
        2⤵
          PID:4920

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1548-135-0x0000000000400000-0x000000000047F000-memory.dmp

              Filesize

              508KB

            • memory/1548-132-0x0000000000400000-0x000000000047F000-memory.dmp

              Filesize

              508KB

            • memory/4920-138-0x0000000000400000-0x000000000047F000-memory.dmp

              Filesize

              508KB

            • memory/4920-136-0x0000000000400000-0x000000000047F000-memory.dmp

              Filesize

              508KB

            • memory/4920-141-0x0000000000400000-0x000000000047F000-memory.dmp

              Filesize

              508KB

            • memory/4920-143-0x0000000000400000-0x000000000047F000-memory.dmp

              Filesize

              508KB

            • memory/4920-145-0x0000000000400000-0x000000000047F000-memory.dmp

              Filesize

              508KB

            • memory/4944-137-0x0000000000400000-0x000000000047F000-memory.dmp

              Filesize

              508KB

            • memory/4944-139-0x0000000000400000-0x000000000047F000-memory.dmp

              Filesize

              508KB

            • memory/4944-140-0x0000000000400000-0x000000000047F000-memory.dmp

              Filesize

              508KB

            • memory/4944-142-0x0000000000400000-0x000000000047F000-memory.dmp

              Filesize

              508KB

            • memory/4944-144-0x0000000000400000-0x000000000047F000-memory.dmp

              Filesize

              508KB