Analysis

  • max time kernel
    175s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 10:37

General

  • Target

    af6e189c4e8db7edd6b964e05841eb9d4742b4484ce52710bf987449c96490ee.exe

  • Size

    570KB

  • MD5

    12a75ae587777acf6d03df00acec0995

  • SHA1

    186ff9ea757f64d9259f29ea52489bef51f1316e

  • SHA256

    af6e189c4e8db7edd6b964e05841eb9d4742b4484ce52710bf987449c96490ee

  • SHA512

    51d7a5f0071d5f02744d42839cf18b2f7dbb54a3b1a8a521641a166a3e89ce560de627e3ca89c9cbb109626333799f31db028bd118a3200c57a4e5a417a39518

  • SSDEEP

    12288:WCl/UUjFJvHSwxQlTRryvKHAx/X/5vNkyWMv:WUdjzfvQFR+iH4hFkrMv

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af6e189c4e8db7edd6b964e05841eb9d4742b4484ce52710bf987449c96490ee.exe
    "C:\Users\Admin\AppData\Local\Temp\af6e189c4e8db7edd6b964e05841eb9d4742b4484ce52710bf987449c96490ee.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3364
    • C:\Users\Admin\AppData\Local\Temp\af6e189c4e8db7edd6b964e05841eb9d4742b4484ce52710bf987449c96490ee.exe
      start
      2⤵
        PID:5068
      • C:\Users\Admin\AppData\Local\Temp\af6e189c4e8db7edd6b964e05841eb9d4742b4484ce52710bf987449c96490ee.exe
        watch
        2⤵
          PID:5052

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3364-137-0x0000000000400000-0x00000000004FB000-memory.dmp

        Filesize

        1004KB

      • memory/5052-139-0x0000000000400000-0x00000000004FB000-memory.dmp

        Filesize

        1004KB

      • memory/5052-140-0x0000000000400000-0x00000000004FB000-memory.dmp

        Filesize

        1004KB

      • memory/5052-141-0x0000000000400000-0x00000000004FB000-memory.dmp

        Filesize

        1004KB

      • memory/5052-144-0x0000000000400000-0x00000000004FB000-memory.dmp

        Filesize

        1004KB

      • memory/5068-138-0x0000000000400000-0x00000000004FB000-memory.dmp

        Filesize

        1004KB

      • memory/5068-142-0x0000000000400000-0x00000000004FB000-memory.dmp

        Filesize

        1004KB

      • memory/5068-143-0x0000000000400000-0x00000000004FB000-memory.dmp

        Filesize

        1004KB