Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2023 09:04

General

  • Target

    ba30cf259f6212a8b1e1ef6f7c71c7be53ede3a80c9d6a423237bc0c4e224d2b.exe

  • Size

    500KB

  • MD5

    2beeb28066bebbc7413c177a95423b6e

  • SHA1

    ab487604abc06e9e313156986e262c4ca0705d82

  • SHA256

    ba30cf259f6212a8b1e1ef6f7c71c7be53ede3a80c9d6a423237bc0c4e224d2b

  • SHA512

    b581db7b9ef6114d6ad89f533a0c87bc519c115c932caab04314d9bee6ffd7402519ef09bc4e8d54fcee2198c3eb466cdc86d5ad96d6867f71283ff4b9b8de61

  • SSDEEP

    12288:UF5nN3kwcpKk3atHKjs6yhg68U6Uu9eN:UF5N31lgjsx/B6

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba30cf259f6212a8b1e1ef6f7c71c7be53ede3a80c9d6a423237bc0c4e224d2b.exe
    "C:\Users\Admin\AppData\Local\Temp\ba30cf259f6212a8b1e1ef6f7c71c7be53ede3a80c9d6a423237bc0c4e224d2b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:360
    • C:\Users\Admin\AppData\Local\Temp\ba30cf259f6212a8b1e1ef6f7c71c7be53ede3a80c9d6a423237bc0c4e224d2b.exe
      "C:\Users\Admin\AppData\Local\Temp\ba30cf259f6212a8b1e1ef6f7c71c7be53ede3a80c9d6a423237bc0c4e224d2b.exe"
      2⤵
        PID:3676

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/360-132-0x0000000075180000-0x0000000075731000-memory.dmp
      Filesize

      5.7MB

    • memory/360-133-0x0000000075180000-0x0000000075731000-memory.dmp
      Filesize

      5.7MB