Analysis

  • max time kernel
    29s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:05

General

  • Target

    65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exe

  • Size

    528KB

  • MD5

    d2baae5d1bf8a26c23f625ce66fc79be

  • SHA1

    84e956020c81a0b1d5758237f28f852770a3be5a

  • SHA256

    65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2

  • SHA512

    f62f8fae931fd452e8c354fb700e8e9b856f69f9afec17539527f968c2a565045ec5435147edfd97c79b022758dd53df43f6b8f2721c75ae71f27127404f9e00

  • SSDEEP

    12288:wNwmpCAmAdCCFIuFqqEyBbzvXETJn5k9qXlhT:T+JtFLbTUxT

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exe
    "C:\Users\Admin\AppData\Local\Temp\65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Users\Admin\AppData\Local\Temp\65efea2500e8318cef98e0872f2e55d99b543fce63b3fb3eead90c37fc351bc2.exe
      tear
      2⤵
        PID:1180

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1180-55-0x0000000000000000-mapping.dmp

    • memory/1180-58-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/1180-59-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/1248-54-0x00000000765A1000-0x00000000765A3000-memory.dmp

      Filesize

      8KB

    • memory/1248-57-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB