Analysis

  • max time kernel
    43s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 04:13

General

  • Target

    bdc7ce4c06260b391aacf1f0bdfbe77c1f0ec688520d2aab514f5bf91a546367.exe

  • Size

    528KB

  • MD5

    60c15eae962c0e90259ecb31b8fb7a7c

  • SHA1

    fa3ca9b75d7ebd240b96f7cbba72882b18ac7446

  • SHA256

    bdc7ce4c06260b391aacf1f0bdfbe77c1f0ec688520d2aab514f5bf91a546367

  • SHA512

    bcca8bad120bf50899baa7ae384af7c8df5b724f01a5e01ce860f9faa34ff48033613fca5bb1ff911ada91e8c106bbd962e581307439982c6fb3d200f94834fa

  • SSDEEP

    12288:W9Ljxx+DkKFv/RpjouXb+1fpY00wh2DhqpnAToZFQm3:W93ck23RpjouXkK00wS8FQm

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdc7ce4c06260b391aacf1f0bdfbe77c1f0ec688520d2aab514f5bf91a546367.exe
    "C:\Users\Admin\AppData\Local\Temp\bdc7ce4c06260b391aacf1f0bdfbe77c1f0ec688520d2aab514f5bf91a546367.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\bdc7ce4c06260b391aacf1f0bdfbe77c1f0ec688520d2aab514f5bf91a546367.exe
      tear
      2⤵
        PID:1128

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1128-58-0x0000000000400000-0x0000000000490000-memory.dmp

            Filesize

            576KB

          • memory/1128-59-0x0000000000400000-0x0000000000490000-memory.dmp

            Filesize

            576KB

          • memory/2016-54-0x0000000075A71000-0x0000000075A73000-memory.dmp

            Filesize

            8KB

          • memory/2016-57-0x0000000000400000-0x0000000000490000-memory.dmp

            Filesize

            576KB