Analysis
-
max time kernel
21s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:59
Static task
static1
Behavioral task
behavioral1
Sample
ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe
Resource
win10v2004-20221111-en
General
-
Target
ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe
-
Size
522KB
-
MD5
6f9896d0134b824ab5da4e3025335236
-
SHA1
aa4af4ef29e9b2be25c37e3363d10bcf7c70719f
-
SHA256
ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3
-
SHA512
32acadc23e411d3e3d9537d28e3a772ab91af55ba5ac830a43f696b4f5191695f94e4a5776133e740e518158ca2cee73b7161e50849e4a35eeacf9d9fea3cba8
-
SSDEEP
6144:LUF8lzohn6ACOAPOpo1JO0EyZpFH+CLUcmQy1CrxQqD9RSaSz+8O5NGBe:gF8ls7bpo1JTNVesy18xQqpx8O5N
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exedescription pid process target process PID 304 wrote to memory of 1992 304 ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe PID 304 wrote to memory of 1992 304 ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe PID 304 wrote to memory of 1992 304 ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe PID 304 wrote to memory of 1992 304 ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe PID 304 wrote to memory of 1992 304 ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe PID 304 wrote to memory of 1992 304 ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe PID 304 wrote to memory of 1992 304 ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe PID 304 wrote to memory of 2008 304 ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe PID 304 wrote to memory of 2008 304 ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe PID 304 wrote to memory of 2008 304 ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe PID 304 wrote to memory of 2008 304 ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe PID 304 wrote to memory of 2008 304 ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe PID 304 wrote to memory of 2008 304 ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe PID 304 wrote to memory of 2008 304 ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe"C:\Users\Admin\AppData\Local\Temp\ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Users\Admin\AppData\Local\Temp\ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exestart2⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\ad4283b646bd5ffd62f120dce784da0a3ef1d28b9083a9c412ed52e1da979ca3.exewatch2⤵PID:2008
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/304-58-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/304-55-0x0000000076121000-0x0000000076123000-memory.dmpFilesize
8KB
-
memory/304-54-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1992-65-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1992-57-0x0000000000000000-mapping.dmp
-
memory/1992-59-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1992-63-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1992-67-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2008-60-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2008-64-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2008-56-0x0000000000000000-mapping.dmp
-
memory/2008-66-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2008-68-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB