Analysis

  • max time kernel
    173s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 11:57

General

  • Target

    e277b7d5c686f171311eca4f9fb234af04d5111c571e48f969edc07f00eda9bb.exe

  • Size

    108KB

  • MD5

    06182e9fce24e549c6c13b34f8cd0288

  • SHA1

    bc25ad511336756d3716d7e92865b9951035954d

  • SHA256

    e277b7d5c686f171311eca4f9fb234af04d5111c571e48f969edc07f00eda9bb

  • SHA512

    2f47e912b7ca8e39c5017a7b1f10b17e6eb6dc69504bdd72961167b5fd0de73d7d0bd04ceb24f97049f440886ec1e0a4fe2e9f9f46b0862486f81fdc316ee0aa

  • SSDEEP

    1536:Y0Szn4peMB33tImd/hi4pRAWN2Y0OCy9PbcypXCWS5a9hc0uAS2ra30Yolz:Y0bpPgP40a0Fy9Pbcyp7Sch/fbaS

Score
1/10

Malware Config

Signatures

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e277b7d5c686f171311eca4f9fb234af04d5111c571e48f969edc07f00eda9bb.exe
    "C:\Users\Admin\AppData\Local\Temp\e277b7d5c686f171311eca4f9fb234af04d5111c571e48f969edc07f00eda9bb.exe"
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:4604

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1216-132-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/1216-134-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB