Analysis

  • max time kernel
    44s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2022 17:23

General

  • Target

    308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exe

  • Size

    713KB

  • MD5

    64220a852ef55ede43f68f0919b56530

  • SHA1

    3b727e0058309199ac97fec1a79802dc654f9019

  • SHA256

    308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217

  • SHA512

    0b3c60d2109b14985886b6bfb468713e27afc3387455973ad71d81a1ed564a86d252e8856a0fbb06f0618d41d14ce38824e45d49f3eec5c6af7ddb1d93b8ee4e

  • SSDEEP

    12288:mtZdx6/zcy8Q8S24TJzMi5mdDWimPCrJhVgQn8m:mX2/n8of5mdaimqrXmQ8m

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exe
    "C:\Users\Admin\AppData\Local\Temp\308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Users\Admin\AppData\Local\Temp\308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exe
      TUXJ
      2⤵
        PID:1252
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 92
        2⤵
        • Program crash
        PID:1692

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217TUXJ

      Filesize

      4B

      MD5

      9134669f44c1af0532f613b7508283c4

      SHA1

      1c2ac638c61bcdbc434fc74649e281bcb1381da2

      SHA256

      7273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2

      SHA512

      ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232

    • memory/1252-55-0x0000000000000000-mapping.dmp

    • memory/1252-57-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB

    • memory/1252-58-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB

    • memory/1692-60-0x0000000000000000-mapping.dmp

    • memory/1744-54-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB

    • memory/1744-56-0x0000000001BE0000-0x0000000001C95000-memory.dmp

      Filesize

      724KB

    • memory/1744-61-0x0000000000400000-0x00000000004B5000-memory.dmp

      Filesize

      724KB