Analysis
-
max time kernel
33s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:10
Static task
static1
Behavioral task
behavioral1
Sample
a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe
Resource
win10v2004-20220901-en
General
-
Target
a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe
-
Size
522KB
-
MD5
06b97f92f670cebffc8f5f8437767fa5
-
SHA1
56586d27c1490ef0871dcd36cfe31094107d6ca2
-
SHA256
a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af
-
SHA512
6ba7228535e7773d80917a0af98df9ddd4a18bc58115241b76e6ae0a3ee180b6b9a0b661c16bfa43ca9707a078949e34859874528b2c23992649f3cef452a37d
-
SSDEEP
6144:gR4nvxarl+ibCaQ97nO5Lpwno+hTziW5BR/5UViZSu0kV8HkGCmQy1CrxQqD9RSY:hJo6aUK5Io+hiW95tmCy18xQqpx8O5h
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exedescription pid process target process PID 1372 wrote to memory of 1736 1372 a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe PID 1372 wrote to memory of 1736 1372 a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe PID 1372 wrote to memory of 1736 1372 a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe PID 1372 wrote to memory of 1736 1372 a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe PID 1372 wrote to memory of 1736 1372 a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe PID 1372 wrote to memory of 1736 1372 a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe PID 1372 wrote to memory of 1736 1372 a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe PID 1372 wrote to memory of 1344 1372 a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe PID 1372 wrote to memory of 1344 1372 a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe PID 1372 wrote to memory of 1344 1372 a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe PID 1372 wrote to memory of 1344 1372 a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe PID 1372 wrote to memory of 1344 1372 a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe PID 1372 wrote to memory of 1344 1372 a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe PID 1372 wrote to memory of 1344 1372 a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe"C:\Users\Admin\AppData\Local\Temp\a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\a076eaa776369e6e9a0112eb5f5211d03d8995900b85d66da101e9b592d9b3af.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1344-56-0x0000000000000000-mapping.dmp
-
memory/1344-59-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1344-63-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1344-67-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1372-54-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1372-55-0x0000000076041000-0x0000000076043000-memory.dmpFilesize
8KB
-
memory/1372-58-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1736-57-0x0000000000000000-mapping.dmp
-
memory/1736-60-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1736-64-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1736-65-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1736-66-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB