Analysis

  • max time kernel
    138s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 15:00

General

  • Target

    c81e69b8be8e3fb041206674792e5c178f24d2ca6a6faff2dbe66a3b76a2de5a.exe

  • Size

    567KB

  • MD5

    4f851fdbfbf6ca817f714e7e6082585d

  • SHA1

    3df8592491437a52dda2db60dc5a883bb615077b

  • SHA256

    c81e69b8be8e3fb041206674792e5c178f24d2ca6a6faff2dbe66a3b76a2de5a

  • SHA512

    da2fbd530a707de1207c775e1c0da9abac29d715346af558520f4ac81645761741dd36bddb3fc74b802ac715ec85e19b7a1fec3ecf7c170e85a28e22997e2d9e

  • SSDEEP

    12288:+hvOPbgUH0tildTZgZkCjuxCQ5fzg+cITso6FTvO6QFboJbFGigkrkcqE/uglOAh:+hvXildOZkLx7gFITsoF6QFboJbFi0h

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c81e69b8be8e3fb041206674792e5c178f24d2ca6a6faff2dbe66a3b76a2de5a.exe
    "C:\Users\Admin\AppData\Local\Temp\c81e69b8be8e3fb041206674792e5c178f24d2ca6a6faff2dbe66a3b76a2de5a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Users\Admin\AppData\Local\Temp\c81e69b8be8e3fb041206674792e5c178f24d2ca6a6faff2dbe66a3b76a2de5a.exe
      start
      2⤵
        PID:4496
      • C:\Users\Admin\AppData\Local\Temp\c81e69b8be8e3fb041206674792e5c178f24d2ca6a6faff2dbe66a3b76a2de5a.exe
        watch
        2⤵
          PID:1576

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1576-138-0x0000000005000000-0x0000000005069000-memory.dmp

              Filesize

              420KB

            • memory/1576-140-0x0000000005000000-0x0000000005069000-memory.dmp

              Filesize

              420KB

            • memory/1668-132-0x0000000000400000-0x000000000048F000-memory.dmp

              Filesize

              572KB

            • memory/1668-135-0x0000000000400000-0x000000000048F000-memory.dmp

              Filesize

              572KB

            • memory/1668-136-0x0000000005000000-0x0000000005069000-memory.dmp

              Filesize

              420KB

            • memory/4496-137-0x0000000005000000-0x0000000005069000-memory.dmp

              Filesize

              420KB

            • memory/4496-139-0x0000000005000000-0x0000000005069000-memory.dmp

              Filesize

              420KB