Analysis

  • max time kernel
    40s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    30-05-2022 15:30

General

  • Target

    0a60dbdcf8bf1881c53d8ad35421ad54e5878b63c03eb479a1d5e9bb0ee05c60.exe

  • Size

    190KB

  • MD5

    93b93121fca5483efaaa9bc4641460a4

  • SHA1

    8bf52615946aa3651c3c0b55d529ce63a9fafdac

  • SHA256

    0a60dbdcf8bf1881c53d8ad35421ad54e5878b63c03eb479a1d5e9bb0ee05c60

  • SHA512

    e65d70a33f2264ec33fac68f418fde8dc90b0337999d35abb3f5b976029ded777ae869aca4e1494454016969db556f58edbe23852b0d7c2986d5b88065c1c0d3

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a60dbdcf8bf1881c53d8ad35421ad54e5878b63c03eb479a1d5e9bb0ee05c60.exe
    "C:\Users\Admin\AppData\Local\Temp\0a60dbdcf8bf1881c53d8ad35421ad54e5878b63c03eb479a1d5e9bb0ee05c60.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 144
      2⤵
      • Program crash
      PID:976

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/976-58-0x0000000000000000-mapping.dmp

  • memory/1048-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

    Filesize

    8KB

  • memory/1048-55-0x0000000000220000-0x0000000000243000-memory.dmp

    Filesize

    140KB

  • memory/1048-57-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB