Analysis
-
max time kernel
170s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-05-2022 02:22
Static task
static1
Behavioral task
behavioral1
Sample
687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe
-
Size
668KB
-
MD5
f52ca29e6654da78370289212d5117f9
-
SHA1
2d0d029673966c5c98ff836f9c1a65d3826e91e6
-
SHA256
687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf
-
SHA512
bb59acd8547fc69a19b9bd29a490b72ee248c8a57d5005b332cec45644f43cb4625f20099b2ac92b7cd0571bc350ad2c1513066b87afd15ea0121522d26169e9
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exedescription pid process target process PID 1220 wrote to memory of 1864 1220 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1220 wrote to memory of 1864 1220 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1220 wrote to memory of 1864 1220 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1220 wrote to memory of 1864 1220 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1220 wrote to memory of 1864 1220 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1220 wrote to memory of 1864 1220 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1220 wrote to memory of 1864 1220 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1220 wrote to memory of 1864 1220 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1220 wrote to memory of 1864 1220 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1220 wrote to memory of 944 1220 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 1220 wrote to memory of 944 1220 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 1220 wrote to memory of 944 1220 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 1220 wrote to memory of 944 1220 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 944 wrote to memory of 1652 944 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 944 wrote to memory of 1652 944 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 944 wrote to memory of 1652 944 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 944 wrote to memory of 1652 944 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 944 wrote to memory of 1652 944 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 944 wrote to memory of 1652 944 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 944 wrote to memory of 1652 944 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 944 wrote to memory of 1652 944 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 944 wrote to memory of 1652 944 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 944 wrote to memory of 1628 944 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 944 wrote to memory of 1628 944 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 944 wrote to memory of 1628 944 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 944 wrote to memory of 1628 944 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 1628 wrote to memory of 316 1628 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1628 wrote to memory of 316 1628 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1628 wrote to memory of 316 1628 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1628 wrote to memory of 316 1628 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1628 wrote to memory of 316 1628 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1628 wrote to memory of 316 1628 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1628 wrote to memory of 316 1628 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1628 wrote to memory of 316 1628 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1628 wrote to memory of 316 1628 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1628 wrote to memory of 1568 1628 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 1628 wrote to memory of 1568 1628 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 1628 wrote to memory of 1568 1628 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 1628 wrote to memory of 1568 1628 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 1568 wrote to memory of 2024 1568 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1568 wrote to memory of 2024 1568 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1568 wrote to memory of 2024 1568 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1568 wrote to memory of 2024 1568 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1568 wrote to memory of 2024 1568 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1568 wrote to memory of 2024 1568 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1568 wrote to memory of 2024 1568 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1568 wrote to memory of 2024 1568 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1568 wrote to memory of 2024 1568 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 1568 wrote to memory of 688 1568 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 1568 wrote to memory of 688 1568 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 1568 wrote to memory of 688 1568 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 1568 wrote to memory of 688 1568 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 688 wrote to memory of 768 688 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 688 wrote to memory of 768 688 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 688 wrote to memory of 768 688 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 688 wrote to memory of 768 688 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 688 wrote to memory of 768 688 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 688 wrote to memory of 768 688 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 688 wrote to memory of 768 688 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 688 wrote to memory of 768 688 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 688 wrote to memory of 768 688 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe MSBuild.exe PID 688 wrote to memory of 1100 688 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 688 wrote to memory of 1100 688 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe PID 688 wrote to memory of 1100 688 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe 687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe"C:\Users\Admin\AppData\Local\Temp\687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe"C:\Users\Admin\AppData\Local\Temp\687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe"C:\Users\Admin\AppData\Local\Temp\687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe"C:\Users\Admin\AppData\Local\Temp\687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe"C:\Users\Admin\AppData\Local\Temp\687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe"C:\Users\Admin\AppData\Local\Temp\687f82ebf8ec4f6228e56174d85062d2e3c3c12250aa7479b67810d5240148bf.exe"6⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/688-65-0x0000000000000000-mapping.dmp
-
memory/688-67-0x00000000010E0000-0x000000000111F000-memory.dmpFilesize
252KB
-
memory/944-56-0x0000000000000000-mapping.dmp
-
memory/944-58-0x00000000010E0000-0x000000000111F000-memory.dmpFilesize
252KB
-
memory/1100-68-0x0000000000000000-mapping.dmp
-
memory/1100-70-0x00000000010E0000-0x000000000111F000-memory.dmpFilesize
252KB
-
memory/1220-54-0x0000000076011000-0x0000000076013000-memory.dmpFilesize
8KB
-
memory/1220-55-0x00000000010E0000-0x000000000111F000-memory.dmpFilesize
252KB
-
memory/1568-62-0x0000000000000000-mapping.dmp
-
memory/1568-64-0x00000000010E0000-0x000000000111F000-memory.dmpFilesize
252KB
-
memory/1628-59-0x0000000000000000-mapping.dmp
-
memory/1628-61-0x00000000010E0000-0x000000000111F000-memory.dmpFilesize
252KB