Analysis

  • max time kernel
    101s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2023 10:15

General

  • Target

    d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe

  • Size

    225KB

  • MD5

    b05ea5fd73d25140cdb31f36789d9003

  • SHA1

    104546947824a7ecc82e52214855825380251353

  • SHA256

    d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490

  • SHA512

    0ab7420c6f57048f400da9581322255bd8c8711dd8aa42baa4d7e4df8299858453f8c6e962539bcf8baecff2f7a30549f9c0de44a3b09e5ab5c6109f20f0692b

  • SSDEEP

    3072:onTbUOF+nL6NIpUSNX0W+eBNyBNmbylKvJCDVe+2Ja36mLXYr238+XrdblRHHHCD:cTbUO06C7X0W3UylgMJa3nX62NcAj9n

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe
    "C:\Users\Admin\AppData\Local\Temp\d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:488
    • C:\Users\Admin\AppData\Local\Temp\d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe
      "C:\Users\Admin\AppData\Local\Temp\d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe" -q=3967108194
      2⤵
        PID:4724
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 320
        2⤵
        • Program crash
        PID:1132
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 488 -ip 488
      1⤵
        PID:692

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/488-132-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/488-133-0x0000000000740000-0x000000000074C000-memory.dmp
        Filesize

        48KB

      • memory/488-134-0x0000000000740000-0x000000000074C000-memory.dmp
        Filesize

        48KB

      • memory/488-135-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/488-138-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/4724-136-0x0000000000000000-mapping.dmp
      • memory/4724-137-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB