Analysis

  • max time kernel
    138s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2023 03:15

General

  • Target

    Rootkits/0925b8985b19d7925d68186d666b0050a4cb3f2a577d64765d770a57a2eab9ae.exe

  • Size

    104KB

  • MD5

    4f5c1bb12c487afacba8802b652210db

  • SHA1

    83883526d86b0dcd71327bad1b1b498fd548b7c9

  • SHA256

    0925b8985b19d7925d68186d666b0050a4cb3f2a577d64765d770a57a2eab9ae

  • SHA512

    c3cce308fc4464ab5473d4a170e087d15672c01dffbae5ea05323b47f4350ff6d0f1f1ea213b2c0bf1a4b5b92086187da8d3760963822a0b8af5b52de58249ad

  • SSDEEP

    1536:H2+Jxz5ugKNwH6E9RZhXl65YCo/SxeACesjw79dlz2Vgfsbg1gNE4wnX02yI/:/xzBKNk9RZ65Yr/BACesjwzstfNxuX/

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Rootkits\0925b8985b19d7925d68186d666b0050a4cb3f2a577d64765d770a57a2eab9ae.exe
    "C:\Users\Admin\AppData\Local\Temp\Rootkits\0925b8985b19d7925d68186d666b0050a4cb3f2a577d64765d770a57a2eab9ae.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1800 -s 220
      2⤵
        PID:3696

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1800-0-0x0000021B5E750000-0x0000021B5EC50000-memory.dmp

      Filesize

      5.0MB