Analysis

  • max time kernel
    139s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    27-06-2022 08:07

General

  • Target

    172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe

  • Size

    1.0MB

  • MD5

    eae5ee3121523c718094873f56b64bce

  • SHA1

    adbc2b251f69f04086e4cf6af74544bcd025d5de

  • SHA256

    172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d

  • SHA512

    f27a60a5d3563a3c04ee2114cdf4526be5511acb9f81b0030024a30f3c81e75765844cd3047813050f4c56d8859ec6006a11a0c13c5091aa7a34d501d48f4e95

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 38 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe
    "C:\Users\Admin\AppData\Local\Temp\172b33e43cbb3ad6705549f5b3af1025e5632ca47d735ec9eb038e169b8e651d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Windows\syswow64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:1644

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/536-54-0x00000000002D0000-0x00000000003B2000-memory.dmp
    Filesize

    904KB

  • memory/536-55-0x0000000000400000-0x0000000000728000-memory.dmp
    Filesize

    3.2MB

  • memory/536-56-0x00000000002D0000-0x00000000003B2000-memory.dmp
    Filesize

    904KB

  • memory/536-57-0x0000000002170000-0x00000000023A0000-memory.dmp
    Filesize

    2.2MB

  • memory/536-58-0x0000000000400000-0x0000000000728000-memory.dmp
    Filesize

    3.2MB

  • memory/536-59-0x0000000075B61000-0x0000000075B63000-memory.dmp
    Filesize

    8KB

  • memory/536-139-0x0000000000400000-0x0000000000728000-memory.dmp
    Filesize

    3.2MB

  • memory/1644-129-0x00000000000B0000-0x00000000000B4000-memory.dmp
    Filesize

    16KB

  • memory/1644-138-0x0000000000140000-0x0000000000144000-memory.dmp
    Filesize

    16KB

  • memory/1644-126-0x0000000000080000-0x0000000000084000-memory.dmp
    Filesize

    16KB

  • memory/1644-127-0x0000000000090000-0x0000000000094000-memory.dmp
    Filesize

    16KB

  • memory/1644-128-0x00000000000A0000-0x00000000000A4000-memory.dmp
    Filesize

    16KB

  • memory/1644-62-0x00000000002E0000-0x00000000002E4000-memory.dmp
    Filesize

    16KB

  • memory/1644-130-0x00000000000C0000-0x00000000000C4000-memory.dmp
    Filesize

    16KB

  • memory/1644-131-0x00000000000D0000-0x00000000000D4000-memory.dmp
    Filesize

    16KB

  • memory/1644-137-0x0000000000130000-0x0000000000134000-memory.dmp
    Filesize

    16KB

  • memory/1644-124-0x0000000000000000-mapping.dmp
  • memory/1644-136-0x0000000000120000-0x0000000000124000-memory.dmp
    Filesize

    16KB

  • memory/1644-135-0x0000000000110000-0x0000000000114000-memory.dmp
    Filesize

    16KB

  • memory/1644-134-0x0000000000100000-0x0000000000104000-memory.dmp
    Filesize

    16KB

  • memory/1644-133-0x00000000000F0000-0x00000000000F4000-memory.dmp
    Filesize

    16KB

  • memory/1644-132-0x00000000000E0000-0x00000000000E4000-memory.dmp
    Filesize

    16KB

  • memory/1644-60-0x00000000002E0000-0x00000000002E4000-memory.dmp
    Filesize

    16KB

  • memory/1644-140-0x0000000000140000-0x0000000000144000-memory.dmp
    Filesize

    16KB