Analysis

  • max time kernel
    277s
  • max time network
    351s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 08:00

General

  • Target

    cd779c0668ccc46a6827f372f64e0dd0e4f89a565bb5b3a1365e0b68b664d2a5.exe

  • Size

    132KB

  • MD5

    34692df9bcc661c394368cfa48496eb0

  • SHA1

    5a16ff14fd2305d9a69fc14c4705bc0e38dfb572

  • SHA256

    cd779c0668ccc46a6827f372f64e0dd0e4f89a565bb5b3a1365e0b68b664d2a5

  • SHA512

    a090ae863458aa8e82ff8e11a11271a4279f062b7bcec1151e80689524c700a88bff5f087a966acd5b9cc05af488cfd67ba4cd54aec4b0fde7c0a54c2b47e5b2

  • SSDEEP

    3072:bnBVcABpmCxIMI+W5/LA2N5lOMUEzPUDJ/h:bBVcAHmkILJ8rMUpDH

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd779c0668ccc46a6827f372f64e0dd0e4f89a565bb5b3a1365e0b68b664d2a5.exe
    "C:\Users\Admin\AppData\Local\Temp\cd779c0668ccc46a6827f372f64e0dd0e4f89a565bb5b3a1365e0b68b664d2a5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Admin\AppData\Local\Temp\cd779c0668ccc46a6827f372f64e0dd0e4f89a565bb5b3a1365e0b68b664d2a5.exe
      ?
      2⤵
        PID:3352

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1908-135-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB