Analysis

  • max time kernel
    9s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:39

General

  • Target

    437e31c0f27a942eea566d2fab41c2aee4a8e3cbb02cde5e67d20c56a734ca75.exe

  • Size

    107KB

  • MD5

    b89c2761a796cd8703e681130885820f

  • SHA1

    cee29d6e905f92d477fc05c056eba2ed884a8d52

  • SHA256

    437e31c0f27a942eea566d2fab41c2aee4a8e3cbb02cde5e67d20c56a734ca75

  • SHA512

    7485f97332125e99e69a76a1e89bfe55cebc80d4c70c3a826498f8ba0caaf08c07174ca9334515b5d1ba546e2c789d6321a96aa8a4ee80cfa8277a4db6cf44a5

  • SSDEEP

    1536:FuBs3knxJtUyLzTEdGPw+yISkJh1jG7fhahmjcM3qpmmM:FuBs3MJtUyP4KePfhU9M3qpnM

Score
10/10

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\437e31c0f27a942eea566d2fab41c2aee4a8e3cbb02cde5e67d20c56a734ca75.exe
    "C:\Users\Admin\AppData\Local\Temp\437e31c0f27a942eea566d2fab41c2aee4a8e3cbb02cde5e67d20c56a734ca75.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1220 -s 560
      2⤵
      • Program crash
      PID:1412

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1220-54-0x0000000000200000-0x0000000000220000-memory.dmp

    Filesize

    128KB

  • memory/1220-55-0x0000000000220000-0x000000000022C000-memory.dmp

    Filesize

    48KB

  • memory/1412-56-0x0000000000000000-mapping.dmp