Analysis

  • max time kernel
    174s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 05:57

General

  • Target

    14abe0fbf10175087f80eb8b8c82cb937337c9ab9536044a27a3b3a2e920c9ec.exe

  • Size

    169KB

  • MD5

    849d9175f55c72ec9e2ec1fa78e05850

  • SHA1

    e3478014333f4a725dfdaf397419007c951096f7

  • SHA256

    14abe0fbf10175087f80eb8b8c82cb937337c9ab9536044a27a3b3a2e920c9ec

  • SHA512

    b7eec756b9d2c196727e07fc862df5ba134c0c998cbc41fe8c3e6e2b0801d4c977b3dd693d116f814c0d51be8062ba626c23c6051c3fa6288ed4a9413650e0c1

  • SSDEEP

    3072:IwGitDc74HZITyqKtVYVT3iSySGNMsfWz1zFVq2ULVSYjtZkt2fJQEiQhnvrZnFb:/GitDc77yvtVgT3MpNzWz15VriSakt28

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14abe0fbf10175087f80eb8b8c82cb937337c9ab9536044a27a3b3a2e920c9ec.exe
    "C:\Users\Admin\AppData\Local\Temp\14abe0fbf10175087f80eb8b8c82cb937337c9ab9536044a27a3b3a2e920c9ec.exe"
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Windows\SysWOW64\msiexec.exe
      C:\Windows\SysWOW64\msiexec.exe
      2⤵
      • Blocklisted process makes network request
      PID:3796

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3796-133-0x0000000000E10000-0x0000000000E22000-memory.dmp

    Filesize

    72KB

  • memory/3796-134-0x0000000000170000-0x000000000019D000-memory.dmp

    Filesize

    180KB

  • memory/3796-135-0x0000000000170000-0x000000000019D000-memory.dmp

    Filesize

    180KB