Analysis

  • max time kernel
    147s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 06:17

General

  • Target

    bc43a18d1409950fa2d9fb489e33e0f89f316a6a08d910bcae22eba100f6f1f8.exe

  • Size

    63KB

  • MD5

    bc8e86dfca3e8bb8cc2dcad6242fb2f8

  • SHA1

    5202709cf460e733ba048c728643503821b2328b

  • SHA256

    bc43a18d1409950fa2d9fb489e33e0f89f316a6a08d910bcae22eba100f6f1f8

  • SHA512

    7ac69f1a26bf3a8c3a2423527cbd57ab2b5fef3e1949288aa27bb7f9a22847d57bcd39e8bf2da966c91acbdb7bf0c4291646da22cdd154a6745aeae9b4e64ddf

  • SSDEEP

    1536:CpOluC6Q8af4MNZwRL/N3CB0WkAR7050WvVTskg:rwCLDZwV/NNe7050YW

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc43a18d1409950fa2d9fb489e33e0f89f316a6a08d910bcae22eba100f6f1f8.exe
    "C:\Users\Admin\AppData\Local\Temp\bc43a18d1409950fa2d9fb489e33e0f89f316a6a08d910bcae22eba100f6f1f8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4800
    • C:\Users\Admin\AppData\Local\Temp\bc43a18d1409950fa2d9fb489e33e0f89f316a6a08d910bcae22eba100f6f1f8.exe
      C:\Users\Admin\AppData\Local\Temp\bc43a18d1409950fa" 48
      2⤵
        PID:1624

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1624-133-0x0000000010000000-0x000000001000D000-memory.dmp

            Filesize

            52KB