Analysis

  • max time kernel
    181s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 04:57

General

  • Target

    587cc04d205089262fc28a898e684dc2dbaa85ed1237430d8a2ebfe24f0157fc.exe

  • Size

    64KB

  • MD5

    cbf662246cae0e0d6cb711de1702f27c

  • SHA1

    dca5c6d28d77fb26261e4cbe30688bb42ebe4a5f

  • SHA256

    587cc04d205089262fc28a898e684dc2dbaa85ed1237430d8a2ebfe24f0157fc

  • SHA512

    f48ee729fe9dd3a07e72d2cda1cfe71cfbb44109c6b5babf3590329ee707b79e3eda2d515d927504d2b24ede185fa6c38e659b6b50ba719c97d7a1903aeff364

  • SSDEEP

    768:DnDePtliCqj8U2GKKGGhBtP9faq8ZTS4LAwiojX2wkc9z2V0M0sDRuNmpUh:D0aCqj8m+8BtPZaqeSkPjm5mRMvRuEU

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\587cc04d205089262fc28a898e684dc2dbaa85ed1237430d8a2ebfe24f0157fc.exe
    "C:\Users\Admin\AppData\Local\Temp\587cc04d205089262fc28a898e684dc2dbaa85ed1237430d8a2ebfe24f0157fc.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3528
    • C:\Users\Admin\AppData\Local\Temp\587cc04d205089262fc28a898e684dc2dbaa85ed1237430d8a2ebfe24f0157fc.exe
      C:\Users\Admin\AppData\Local\Temp\587cc04d205089262" 48
      2⤵
        PID:1996

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1996-133-0x0000000010000000-0x000000001000C000-memory.dmp

            Filesize

            48KB