Analysis

  • max time kernel
    38s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 20:12

General

  • Target

    624a037556e4efd1d3a871f2ded3e2e4bc4355b3561ac41c3c7505f7802bcb0c.exe

  • Size

    650KB

  • MD5

    811e108de065bce7acb9b2793b9727dd

  • SHA1

    922cd222862c622b16440e3baaba955f07229b9c

  • SHA256

    624a037556e4efd1d3a871f2ded3e2e4bc4355b3561ac41c3c7505f7802bcb0c

  • SHA512

    cef1e5102ec82f111b7d996ef3d9b9f01fa361d06c1744ed4cab63b254ef268a383d8f4af7d19da9f7a8e1c70a2e32069b90ad188ba9fa4380d25bf0fa7b3686

  • SSDEEP

    6144:djMzjm/xWSmRs5mSzS0P04GZrGKddNnsGPCTFNlUeKFWcSB6LXmP/ALJLNntmjxV:FzWm7HXKdwQuKFWcb2HAvwjxMZb4ahI

Score
5/10

Malware Config

Signatures

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\624a037556e4efd1d3a871f2ded3e2e4bc4355b3561ac41c3c7505f7802bcb0c.exe
    "C:\Users\Admin\AppData\Local\Temp\624a037556e4efd1d3a871f2ded3e2e4bc4355b3561ac41c3c7505f7802bcb0c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 216
      2⤵
      • Program crash
      PID:2016

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1340-54-0x0000000076411000-0x0000000076413000-memory.dmp

          Filesize

          8KB

        • memory/1340-56-0x0000000000400000-0x00000000004B4000-memory.dmp

          Filesize

          720KB