Analysis

  • max time kernel
    43s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2022, 01:03

General

  • Target

    f4f356e0bc9b2b3f6d7e67563a1f3bc28f922c33762b4e01762e6edec621470f.exe

  • Size

    128KB

  • MD5

    52ce96a9bdbb2aaabdbad2e3cb563c34

  • SHA1

    9c97ae09ffe46c133f69530812364fdf4bfe5de3

  • SHA256

    f4f356e0bc9b2b3f6d7e67563a1f3bc28f922c33762b4e01762e6edec621470f

  • SHA512

    961618c672552ebc8fcc55463d6f289552b118187314f0140f260460f45951ef2848732a68905a0e3b3259e0d227c082c57e86143adf8eacac588bf4ca670dc3

  • SSDEEP

    3072:qNZA6H3jn123LFB4SfmH75sEg71teUg7Vy:q5HDwfvu9X610Ug7Vy

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4f356e0bc9b2b3f6d7e67563a1f3bc28f922c33762b4e01762e6edec621470f.exe
    "C:\Users\Admin\AppData\Local\Temp\f4f356e0bc9b2b3f6d7e67563a1f3bc28f922c33762b4e01762e6edec621470f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\f4f356e0bc9b2b3f6d7e67563a1f3bc28f922c33762b4e01762e6edec621470f.exe
      "C:\Users\Admin\AppData\Local\Temp\f4f356e0bc9b2b3f6d7e67563a1f3bc28f922c33762b4e01762e6edec621470f.exe" 3396742884456807701
      2⤵
      • Modifies system certificate store
      PID:1284

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1284-57-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/1712-54-0x00000000765B1000-0x00000000765B3000-memory.dmp

          Filesize

          8KB