Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 17:34

General

  • Target

    e057dbe1acb639a8ff4e10e83942a1592351849c2c58bc6ab70b3d056e49c5ff.exe

  • Size

    557KB

  • MD5

    291dfe01343923bfd4e79c1b9d1c2aa0

  • SHA1

    0e8693e2b9ba0000e5264f1e79e7642eff3faf3e

  • SHA256

    e057dbe1acb639a8ff4e10e83942a1592351849c2c58bc6ab70b3d056e49c5ff

  • SHA512

    6ccbdfe0608b48bbec23792d86f9bc137470697ab12fd1c010f111c98feeb6749c7c179b073f726f9757990e24194c30b837b6f3e159577e0e38c7e5ef8e38d3

  • SSDEEP

    12288:EkEzbUd4JFPjRqh1MusAs+rpxPbEHmnqosDfXKZ:EkEzbUd+CfsepZbEsXsfaZ

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e057dbe1acb639a8ff4e10e83942a1592351849c2c58bc6ab70b3d056e49c5ff.exe
    "C:\Users\Admin\AppData\Local\Temp\e057dbe1acb639a8ff4e10e83942a1592351849c2c58bc6ab70b3d056e49c5ff.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$203130531.bat
      2⤵
        PID:1732

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\$203130531.bat

            Filesize

            184B

            MD5

            6863af2246833df526694deefdfff0e6

            SHA1

            fc6d36ff1c5fec3415a01c0d97e14e5ad2c291b6

            SHA256

            cd9dec23a668d409eda1efc2d61f5a7eb48aecda53fc3de9d1867855016b7b66

            SHA512

            4b11913872786ef5a54add2ceca101c103d1ec0f2638b058836cdee3495c0f651173ae927a6e4d10cd971e32fa4ddeeee9bce12b888b3269b5b9a59a550f97f3