Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 04:27

General

  • Target

    a0233a7c34bef1b89d2db6ec1bfc1769a0a18d49fc71690838f5c4930c665f22.exe

  • Size

    56KB

  • MD5

    4f4a7be59e5ce3cc3866da920db7a339

  • SHA1

    d31cc306f9610bc8760e0d7ab3b1f209dbe8f35f

  • SHA256

    a0233a7c34bef1b89d2db6ec1bfc1769a0a18d49fc71690838f5c4930c665f22

  • SHA512

    a051ad0ba1c4e249493bbfcd4610a3e2efa86f1ddce257f4a2d34aeb993b0cff05c85916ea9fff1ae4072371859f4f71d52b1a0cae299ffad460d4bc2a888c51

  • SSDEEP

    1536:56yYCqj8VLeokhucjd1l2dv7tZqe1ysravVTskg:5iC9Leokhum1gDbqIysr8W

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0233a7c34bef1b89d2db6ec1bfc1769a0a18d49fc71690838f5c4930c665f22.exe
    "C:\Users\Admin\AppData\Local\Temp\a0233a7c34bef1b89d2db6ec1bfc1769a0a18d49fc71690838f5c4930c665f22.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Users\Admin\AppData\Local\Temp\a0233a7c34bef1b89d2db6ec1bfc1769a0a18d49fc71690838f5c4930c665f22.exe
      C:\Users\Admin\AppData\Local\Temp\a0233a7c34bef1b89" 48
      2⤵
        PID:4712

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4712-132-0x0000000000000000-mapping.dmp

    • memory/4712-133-0x0000000010000000-0x000000001000C000-memory.dmp

      Filesize

      48KB