Analysis

  • max time kernel
    145s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 07:56

General

  • Target

    42cf5c5c3990c10b9cd4aa21c0f0bc1de61f09d4ae292769f044242920c10ba5.exe

  • Size

    122KB

  • MD5

    681dfb678c2194da4a0ed81b04313d30

  • SHA1

    76f51f5f424fbc453c868141833040f0504bd410

  • SHA256

    42cf5c5c3990c10b9cd4aa21c0f0bc1de61f09d4ae292769f044242920c10ba5

  • SHA512

    9b67d22f2689c2141a926cb2b8f5bbaad087c9d92c69a759191384fa8fdfb318f4ba2fbd920bee2d1b7ce0ba63dc109e48e215e90ae4611a8aef52798a525021

  • SSDEEP

    3072:NxvaYyU+DyixeYJCO7J5burTOkSzuTKxP:TvSU9KUO7J5bNkSiTw

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42cf5c5c3990c10b9cd4aa21c0f0bc1de61f09d4ae292769f044242920c10ba5.exe
    "C:\Users\Admin\AppData\Local\Temp\42cf5c5c3990c10b9cd4aa21c0f0bc1de61f09d4ae292769f044242920c10ba5.exe"
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:308

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/308-55-0x0000000074D61000-0x0000000074D63000-memory.dmp

            Filesize

            8KB

          • memory/308-58-0x0000000000F80000-0x0000000000F88000-memory.dmp

            Filesize

            32KB

          • memory/308-59-0x0000000000080000-0x0000000000091000-memory.dmp

            Filesize

            68KB

          • memory/308-60-0x00000000001B0000-0x0000000000230000-memory.dmp

            Filesize

            512KB

          • memory/1472-56-0x00000000002C0000-0x00000000002D3000-memory.dmp

            Filesize

            76KB

          • memory/1472-57-0x0000000000400000-0x0000000000413000-memory.dmp

            Filesize

            76KB