Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-06-2022 13:10
Static task
static1
Behavioral task
behavioral1
Sample
e79d48bc650a2e1bd36d73f438826b8d.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e79d48bc650a2e1bd36d73f438826b8d.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
e79d48bc650a2e1bd36d73f438826b8d.exe
-
Size
71KB
-
MD5
e79d48bc650a2e1bd36d73f438826b8d
-
SHA1
191e1644ca6b40fd8469d8013e4f931ac9877c18
-
SHA256
5f3916cde8f3852fc370be7442e668f31a0d676f2ae912f88042481f972cc26a
-
SHA512
7451442c8ff56ce0124efe429afbba480c71e56247f5cbebe83a0aa7107e9e3c3f68e891dfa928d1fc47be8c5fd715f59ebd252cf4d3d06f1eb471f6d422948d
Score
10/10
Malware Config
Signatures
-
suricata: ET MALWARE Possible Metasploit Payload Common Construct Bind_API (from server)
suricata: ET MALWARE Possible Metasploit Payload Common Construct Bind_API (from server)
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
e79d48bc650a2e1bd36d73f438826b8d.exedescription pid process target process PID 4112 wrote to memory of 4532 4112 e79d48bc650a2e1bd36d73f438826b8d.exe svchost.exe PID 4112 wrote to memory of 4532 4112 e79d48bc650a2e1bd36d73f438826b8d.exe svchost.exe PID 4112 wrote to memory of 4532 4112 e79d48bc650a2e1bd36d73f438826b8d.exe svchost.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4532-130-0x0000020320510000-0x0000020320545000-memory.dmpFilesize
212KB
-
memory/4532-131-0x0000020320550000-0x000002032058B000-memory.dmpFilesize
236KB
-
memory/4532-132-0x0000020322402000-0x000002032245B000-memory.dmpFilesize
356KB
-
memory/4532-133-0x00000203222E0000-0x000002032233F000-memory.dmpFilesize
380KB
-
memory/4532-134-0x000002032069B000-0x00000203206BC000-memory.dmpFilesize
132KB
-
memory/4532-135-0x0000020322340000-0x0000020322367000-memory.dmpFilesize
156KB
-
memory/4532-136-0x0000020320550000-0x000002032058B000-memory.dmpFilesize
236KB
-
memory/4532-137-0x0000020322402000-0x000002032245B000-memory.dmpFilesize
356KB
-
memory/4532-138-0x000002032069B000-0x00000203206BC000-memory.dmpFilesize
132KB