Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
24-01-2022 00:28
Static task
static1
Behavioral task
behavioral1
Sample
d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe
-
Size
56KB
-
MD5
248cecd1ffa1f5de46d8643a1e96e9a8
-
SHA1
8da9d2c2a06720daec54a2490e1f6942177d1de4
-
SHA256
d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46
-
SHA512
7d55504c652fffdf2ebeb392c855882035fae71a8ab936ba859bcd69163567c35d60fabfca271890213c1779284bc41bdbf771e10cbf5661008a7c45e3973703
Score
1/10
Malware Config
Signatures
-
Modifies data under HKEY_USERS 1 IoCs
Processes:
d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Control Panel\International d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exedescription pid process target process PID 1636 wrote to memory of 520 1636 d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe PID 1636 wrote to memory of 520 1636 d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe PID 1636 wrote to memory of 520 1636 d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe PID 1636 wrote to memory of 520 1636 d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe PID 1636 wrote to memory of 520 1636 d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe"C:\Users\Admin\AppData\Local\Temp\d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe"C:\Users\Admin\AppData\Local\Temp\d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe"C:\Users\Admin\AppData\Local\Temp\d97c0b6ee613e03aa3256fcdd3757e54ba4c7bb5910887247dc857f2701f9a46.exe"2⤵
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/780-55-0x0000000076B81000-0x0000000076B83000-memory.dmpFilesize
8KB