Analysis

  • max time kernel
    443s
  • max time network
    1174s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23-05-2024 00:17

General

  • Target

    rrrr/STRESS TEST/Y-CRUNCHER/Binaries/11-BD1 ~ Miyu.exe

  • Size

    5.9MB

  • MD5

    4a1748a709846514af5efb760a7d9d39

  • SHA1

    e001454d97ae2367429ea33741b032b72c409db6

  • SHA256

    32d92df4b0df19689973375558d67d254538ab2c477baae5f40ac00b449a2967

  • SHA512

    c415da639bbe521763eee62bbc44fcca2ec9902ec8cef6b8bc3899bcc53ef3e81fd3203dba522d97608cf11d6efa1700a40263a4ca8e5d96199e97e1e5188291

  • SSDEEP

    49152:g9zCtHtksFuq4S7fpLgeo+gl3GpH4AKWK4C42Fml8o/L9fHflAWi75Skk7VAB:FVtk/l4Wmp96tk

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rrrr\STRESS TEST\Y-CRUNCHER\Binaries\11-BD1 ~ Miyu.exe
    "C:\Users\Admin\AppData\Local\Temp\rrrr\STRESS TEST\Y-CRUNCHER\Binaries\11-BD1 ~ Miyu.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3932
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c pause
      2⤵
        PID:4840

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads