Analysis

  • max time kernel
    54s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 23:50

General

  • Target

    57a6b10173a6da6607f8d643e58ba2d8cbaa1fac2b50110190a55196fcf40f15.exe

  • Size

    28KB

  • MD5

    02980d631688c142d56ac7276e13c6f5

  • SHA1

    924e43be5a2a88790de37744c9af8ea6adf5577c

  • SHA256

    57a6b10173a6da6607f8d643e58ba2d8cbaa1fac2b50110190a55196fcf40f15

  • SHA512

    64bbed7155b6dc685d79024e98dab6543fa2b1c953da0bb621d79029730fea66998fc866c019ea9e3c920d2933b5c8136aa498d23c847a691bc60ca4e3c7c22b

  • SSDEEP

    384:UmOyMLjKMPH1Dxw7ZA8l9ZoA7k+w9G5hmssR0IkR46nzojn8mgRRtssIeo/r5J1k:hUjKVjl9xw3x6nz7vj1wrYf

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\57a6b10173a6da6607f8d643e58ba2d8cbaa1fac2b50110190a55196fcf40f15.exe
        "C:\Users\Admin\AppData\Local\Temp\57a6b10173a6da6607f8d643e58ba2d8cbaa1fac2b50110190a55196fcf40f15.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1776

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1212-57-0x000000007EFC0000-0x000000007EFC6000-memory.dmp

      Filesize

      24KB

    • memory/1776-54-0x0000000075D61000-0x0000000075D63000-memory.dmp

      Filesize

      8KB

    • memory/1776-55-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1776-56-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB