Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:05

General

  • Target

    c66670c43c927ad6a7d16950780a2d1e1ace34c6f53eff947859427a9efe294e.exe

  • Size

    528KB

  • MD5

    f9b650f31eb87d3387e6a7cc1790284c

  • SHA1

    5d7592ad31bf3d7a0a77cd862223e1cd1bdbeacf

  • SHA256

    c66670c43c927ad6a7d16950780a2d1e1ace34c6f53eff947859427a9efe294e

  • SHA512

    2df68331a23d8221650f721948448bcfac339db0db4f45489a3683a82c5aadf2ac487bc39e959bca389ff78e0e743fee956ceb3e1b1321ff033b185f326af144

  • SSDEEP

    12288:+7NUFsd3m48htJuiwFIu6UFqqEyBbzvXETJn5k9q6lkQ:QC/HhtU7eUFLbTUTQ

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c66670c43c927ad6a7d16950780a2d1e1ace34c6f53eff947859427a9efe294e.exe
    "C:\Users\Admin\AppData\Local\Temp\c66670c43c927ad6a7d16950780a2d1e1ace34c6f53eff947859427a9efe294e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Users\Admin\AppData\Local\Temp\c66670c43c927ad6a7d16950780a2d1e1ace34c6f53eff947859427a9efe294e.exe
      tear
      2⤵
        PID:884

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/884-55-0x0000000000000000-mapping.dmp

    • memory/884-58-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/884-59-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/1812-54-0x0000000076411000-0x0000000076413000-memory.dmp

      Filesize

      8KB

    • memory/1812-56-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB