Analysis

  • max time kernel
    336s
  • max time network
    404s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 06:22

General

  • Target

    1e0d6e0e21dd270dc4dc886fb79b49e80bb74e8a7c19840795da69288ee5037c.exe

  • Size

    61KB

  • MD5

    4fe671ee9e5998c8be0c6f1a9c339624

  • SHA1

    a47106b6b381ce988fb4168bd058f3bcd87afa52

  • SHA256

    1e0d6e0e21dd270dc4dc886fb79b49e80bb74e8a7c19840795da69288ee5037c

  • SHA512

    fdf5176b3d956129df02c46a40fb66c0e61a642b81ee8d8b288d5509144127219bbb3cb00ddb932db8a05dc8c4c5d3c0b8c065d1761d1d490d4c084a885ba17f

  • SSDEEP

    1536:9/eplCqR84b3yhPaZEOallH1Cagt4yhOUvwrOSUN9PX:92plClPialzgJhOUvwrhUN9P

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e0d6e0e21dd270dc4dc886fb79b49e80bb74e8a7c19840795da69288ee5037c.exe
    "C:\Users\Admin\AppData\Local\Temp\1e0d6e0e21dd270dc4dc886fb79b49e80bb74e8a7c19840795da69288ee5037c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Users\Admin\AppData\Local\Temp\1e0d6e0e21dd270dc4dc886fb79b49e80bb74e8a7c19840795da69288ee5037c.exe
      C:\Users\Admin\AppData\Local\Temp\1e0d6e0e21dd270dc" 48
      2⤵
        PID:2368

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2368-133-0x0000000010000000-0x000000001000C000-memory.dmp

            Filesize

            48KB