Analysis

  • max time kernel
    143s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2023 19:35

General

  • Target

    143f73a29a862a13e6523214054ccb10fd7e918691c69b9682d4c1935aa1b252.exe

  • Size

    2.1MB

  • MD5

    aa8145c07278629d23e39b919bb56855

  • SHA1

    f0024c293308cb9a40ea8e0dc51a96899a016267

  • SHA256

    143f73a29a862a13e6523214054ccb10fd7e918691c69b9682d4c1935aa1b252

  • SHA512

    b97e06a2f476913f7a8547392605fd058e1d144a906cc8ffbfef199f5f695f779d9d7215bb88f486ab21eb5b5d32a3673136febb01468728e3bc00fea280154d

  • SSDEEP

    49152:JzkeLUDd9iaXDnsx9L7uDaLoBh6byVXofq0Gh:JzH89zn89L7uDMoBh6bM4oh

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\143f73a29a862a13e6523214054ccb10fd7e918691c69b9682d4c1935aa1b252.exe
    "C:\Users\Admin\AppData\Local\Temp\143f73a29a862a13e6523214054ccb10fd7e918691c69b9682d4c1935aa1b252.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4332
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1320
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:4908

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\BL.ini
        Filesize

        42B

        MD5

        f2f7184638f87aef5caa04a92642b548

        SHA1

        b9e64c413c614d5675be07358ff979a0ee6ddccd

        SHA256

        66afe575217e84096b23f2cbb3c4bdc444290bec2a8384a60447f23250e25752

        SHA512

        4b2d7996599e3eb6e49e02988f8676b03795fdebcbbad978a91ad4169275caa121d72ba1ace443a95e1df80fc4b4db38c453ed4c3d2fd420f11f6e121fa3a50f

      • memory/4332-133-0x0000000000400000-0x0000000001267000-memory.dmp
        Filesize

        14.4MB

      • memory/4332-134-0x0000000000400000-0x0000000001267000-memory.dmp
        Filesize

        14.4MB

      • memory/4332-135-0x0000000000400000-0x0000000001267000-memory.dmp
        Filesize

        14.4MB

      • memory/4332-136-0x0000000000400000-0x0000000001267000-memory.dmp
        Filesize

        14.4MB

      • memory/4332-137-0x00000000030E0000-0x00000000030E1000-memory.dmp
        Filesize

        4KB

      • memory/4332-143-0x0000000000400000-0x0000000001267000-memory.dmp
        Filesize

        14.4MB

      • memory/4332-144-0x00000000030E0000-0x00000000030E1000-memory.dmp
        Filesize

        4KB

      • memory/4332-151-0x0000000000400000-0x0000000001267000-memory.dmp
        Filesize

        14.4MB

      • memory/4332-157-0x0000000000400000-0x0000000001267000-memory.dmp
        Filesize

        14.4MB

      • memory/4332-160-0x0000000000400000-0x0000000001267000-memory.dmp
        Filesize

        14.4MB