Analysis

  • max time kernel
    19s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2022 02:06

General

  • Target

    a3d3b03945e39e8f434a0e48ecc76272668fa57b117783ef62ed0ba5b744be0d.exe

  • Size

    518KB

  • MD5

    1ac656c81afd76302e6a3b576c93fcac

  • SHA1

    44a35c564fae3443fd9c8eeef2dc601eb6d30012

  • SHA256

    a3d3b03945e39e8f434a0e48ecc76272668fa57b117783ef62ed0ba5b744be0d

  • SHA512

    597e71bd336a9f9c6dc3f364a19f8c6a25edf3c3f46d5214e3ba934efb1ecef9ceb4ab20b6b6aaa6459b247b310c21abaf2f2f03e53ee122eddf1240ec313360

  • SSDEEP

    12288:wh8W2QMeqOGSbJUjgwYYlLPt5oKnWq3Ub:wWTeMFlLPt5/Wp

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3d3b03945e39e8f434a0e48ecc76272668fa57b117783ef62ed0ba5b744be0d.exe
    "C:\Users\Admin\AppData\Local\Temp\a3d3b03945e39e8f434a0e48ecc76272668fa57b117783ef62ed0ba5b744be0d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\a3d3b03945e39e8f434a0e48ecc76272668fa57b117783ef62ed0ba5b744be0d.exe
      start
      2⤵
        PID:2024
      • C:\Users\Admin\AppData\Local\Temp\a3d3b03945e39e8f434a0e48ecc76272668fa57b117783ef62ed0ba5b744be0d.exe
        watch
        2⤵
          PID:952

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/952-55-0x0000000000000000-mapping.dmp

      • memory/952-60-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/952-63-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/2024-56-0x0000000000000000-mapping.dmp

      • memory/2024-61-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/2024-62-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/2040-54-0x00000000753F1000-0x00000000753F3000-memory.dmp

        Filesize

        8KB

      • memory/2040-57-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB