Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
26-09-2021 23:00
Static task
static1
Behavioral task
behavioral1
Sample
Loader.bin.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Loader.bin.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
Loader.bin.exe
-
Size
6KB
-
MD5
5c3b3d29900401cf7c8a6f7da0a1d7fa
-
SHA1
41cf781fed46bf34cbec0a2852c56592297cc7ed
-
SHA256
fc4590965f4831e8ed0e8465df39ca064d14dfcb79f320bf937ba18807d08f2c
-
SHA512
ddec58841d1b8c9278802ae310701c89eaf6cf306d21cd0af1b913e54ea524438799c1038f5a3c2b2288b770b46fad785331798b7ee826fb30e5e65965bdceca
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Loader.bin.exedescription pid process target process PID 1652 wrote to memory of 1568 1652 Loader.bin.exe dw20.exe PID 1652 wrote to memory of 1568 1652 Loader.bin.exe dw20.exe PID 1652 wrote to memory of 1568 1652 Loader.bin.exe dw20.exe PID 1652 wrote to memory of 1568 1652 Loader.bin.exe dw20.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1568-55-0x0000000000000000-mapping.dmp
-
memory/1568-58-0x0000000002500000-0x0000000002501000-memory.dmpFilesize
4KB
-
memory/1652-54-0x0000000074C71000-0x0000000074C73000-memory.dmpFilesize
8KB
-
memory/1652-57-0x00000000021B0000-0x00000000021B1000-memory.dmpFilesize
4KB