Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:00
Static task
static1
Behavioral task
behavioral1
Sample
a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exe
Resource
win10v2004-20220812-en
General
-
Target
a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exe
-
Size
518KB
-
MD5
44a01d819b85e3917f76f418ad64bf5e
-
SHA1
4cd37880e827d5157ce2d474cfbd608ac4d4de49
-
SHA256
a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7
-
SHA512
a6f20a0a05e4460744c0e6cdc8ba7defd8265877c157eebabb8ecb136d7b00750ace7bffda6123833d1ac9dc24e587b942f3b0ad4c9f7c0928bb36cc0f8c95ff
-
SSDEEP
12288:Emmg1YSUzucp6ate8nefoknLwYYlLPt5oKnWq32b:E6quSf9yo2wlLPt5/Wr
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exedescription pid process target process PID 4728 wrote to memory of 800 4728 a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exe a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exe PID 4728 wrote to memory of 800 4728 a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exe a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exe PID 4728 wrote to memory of 800 4728 a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exe a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exe PID 4728 wrote to memory of 3064 4728 a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exe a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exe PID 4728 wrote to memory of 3064 4728 a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exe a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exe PID 4728 wrote to memory of 3064 4728 a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exe a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exe"C:\Users\Admin\AppData\Local\Temp\a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exestart2⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\a7ea87f97e9ceef06de613c7cbc0124706124c3200f3c30c17a0e542af8ab1c7.exewatch2⤵PID:3064
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/800-133-0x0000000000000000-mapping.dmp
-
memory/800-135-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/800-137-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/3064-132-0x0000000000000000-mapping.dmp
-
memory/3064-136-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/3064-138-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/4728-134-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB