Analysis

  • max time kernel
    45s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 09:24

General

  • Target

    563a2981fa9819f61ac94a28c3c54f10623d6fe760f467cd93e41f508099c6cc.exe

  • Size

    28KB

  • MD5

    658d5c08e5d15f59cff7cfce964aeadb

  • SHA1

    550145876145615e15a3c0113a4bdcf804d7fba5

  • SHA256

    563a2981fa9819f61ac94a28c3c54f10623d6fe760f467cd93e41f508099c6cc

  • SHA512

    a21b731ae9e85d7405fc0352c96eb2a7fa6ba76ffb09db5dabd58df9a0ae9c62648a57924ca9322dd7f5c7011992a2a504711ab2a595900969c4aacf1d184a66

  • SSDEEP

    384:UmOyMLjKMPH1Dxw7ZA8l9ZoA7k+w9G5hmssR0IkR46nzojn8mgRRtssIeo/r5J1X:hUjKVjl9xw3x6nz7vj1wrdfD

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1376
      • C:\Users\Admin\AppData\Local\Temp\563a2981fa9819f61ac94a28c3c54f10623d6fe760f467cd93e41f508099c6cc.exe
        "C:\Users\Admin\AppData\Local\Temp\563a2981fa9819f61ac94a28c3c54f10623d6fe760f467cd93e41f508099c6cc.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1400

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1376-57-0x000000007EFC0000-0x000000007EFC6000-memory.dmp

            Filesize

            24KB

          • memory/1400-54-0x0000000075FB1000-0x0000000075FB3000-memory.dmp

            Filesize

            8KB

          • memory/1400-56-0x0000000010000000-0x0000000010011000-memory.dmp

            Filesize

            68KB

          • memory/1400-55-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB