Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 13:16

General

  • Target

    21169db244f2679c4aa86345a5eaf767.exe

  • Size

    17KB

  • MD5

    21169db244f2679c4aa86345a5eaf767

  • SHA1

    5175f64f561203054283de1906672defd1bed83b

  • SHA256

    8e28b914229f3d23f0e2df17abe3074bd3a83d72d62ca62d0605bc92e9b934d8

  • SHA512

    172f057a722de17b0557c47dae7c9ea606d887d64edabad1594e225bc40d7f8fc442383c2d3068693d112cfafac1bdb58310d4d3fe141b3c282dd3be06b5a1bc

  • SSDEEP

    192:sJ/PMkjD44MP7nAxgwCMrpY7e8LqPZo5LdCfq1Rn6O3G:sJ/PMD4qAxgr6+e9Pfqbn1G

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\SysWOW64\cmd.exe
    C:\Windows\system32\cmd.exe /c CLS
    1⤵
      PID:4272
    • C:\Users\Admin\AppData\Local\Temp\21169db244f2679c4aa86345a5eaf767.exe
      "C:\Users\Admin\AppData\Local\Temp\21169db244f2679c4aa86345a5eaf767.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2440

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2440-0-0x0000000000400000-0x0000000000408000-memory.dmp

            Filesize

            32KB