Analysis

  • max time kernel
    180s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 11:48

General

  • Target

    e68efa787e0b7f40414d6c7559881ea68cee8babde68207500655a3810e747d5.exe

  • Size

    90KB

  • MD5

    b3a3c648b5688225cc3f4ee79c694a08

  • SHA1

    158ad8b2d8e19803e286f87c69dd25f883cd150b

  • SHA256

    e68efa787e0b7f40414d6c7559881ea68cee8babde68207500655a3810e747d5

  • SHA512

    e00cd5c775ac336e8f814e9ca37339368577175b87ad60e0cdce7985c53f642433c71ab20756c4cf7e152166b8c1a62bccea2ac02ddc329a560e815fc1a1f356

  • SSDEEP

    1536:T8pXcai2wkzG8QfT7Zie+2uKdqLLhiZwyGne+wi43mQ3Y4vscqrDhvyxmvUCKilZ:TesMHwN7hqLLhAwyT1X3m99vyOl7

Score
1/10

Malware Config

Signatures

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e68efa787e0b7f40414d6c7559881ea68cee8babde68207500655a3810e747d5.exe
    "C:\Users\Admin\AppData\Local\Temp\e68efa787e0b7f40414d6c7559881ea68cee8babde68207500655a3810e747d5.exe"
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:712

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1044-133-0x00000000004A0000-0x00000000004A3000-memory.dmp

      Filesize

      12KB

    • memory/1044-134-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB