Analysis
-
max time kernel
27s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:00
Static task
static1
Behavioral task
behavioral1
Sample
a4196ce5b34b9ba1364c12d6131b4ae8825ed4b8a238e54f756489de8fd0cc84.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a4196ce5b34b9ba1364c12d6131b4ae8825ed4b8a238e54f756489de8fd0cc84.exe
Resource
win10v2004-20221111-en
General
-
Target
a4196ce5b34b9ba1364c12d6131b4ae8825ed4b8a238e54f756489de8fd0cc84.exe
-
Size
529KB
-
MD5
f613f7d16285ba9261a0e291fd3e7f31
-
SHA1
6a8e8030f4eb88e60229765bfd1f9e9370890851
-
SHA256
a4196ce5b34b9ba1364c12d6131b4ae8825ed4b8a238e54f756489de8fd0cc84
-
SHA512
62a0b65f32c139f2a87065918446f1aa9be494a7a25f371270ac145214e36a465389633a65342a2a20dbdae80c94c82cd9840501a22db3bb4563b4247ea5f940
-
SSDEEP
6144:l2IdM6q5Y1RyC71SZSLZ/6nVmOouQu2ru+2k3wOJ4iPwf27vTtYVdSdpbhbX/27k:1xSaYWu2rHwsTeVd4z2KnPxYbI
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
a4196ce5b34b9ba1364c12d6131b4ae8825ed4b8a238e54f756489de8fd0cc84.exedescription pid process target process PID 1092 wrote to memory of 1184 1092 a4196ce5b34b9ba1364c12d6131b4ae8825ed4b8a238e54f756489de8fd0cc84.exe a4196ce5b34b9ba1364c12d6131b4ae8825ed4b8a238e54f756489de8fd0cc84.exe PID 1092 wrote to memory of 1184 1092 a4196ce5b34b9ba1364c12d6131b4ae8825ed4b8a238e54f756489de8fd0cc84.exe a4196ce5b34b9ba1364c12d6131b4ae8825ed4b8a238e54f756489de8fd0cc84.exe PID 1092 wrote to memory of 1184 1092 a4196ce5b34b9ba1364c12d6131b4ae8825ed4b8a238e54f756489de8fd0cc84.exe a4196ce5b34b9ba1364c12d6131b4ae8825ed4b8a238e54f756489de8fd0cc84.exe PID 1092 wrote to memory of 1184 1092 a4196ce5b34b9ba1364c12d6131b4ae8825ed4b8a238e54f756489de8fd0cc84.exe a4196ce5b34b9ba1364c12d6131b4ae8825ed4b8a238e54f756489de8fd0cc84.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4196ce5b34b9ba1364c12d6131b4ae8825ed4b8a238e54f756489de8fd0cc84.exe"C:\Users\Admin\AppData\Local\Temp\a4196ce5b34b9ba1364c12d6131b4ae8825ed4b8a238e54f756489de8fd0cc84.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\a4196ce5b34b9ba1364c12d6131b4ae8825ed4b8a238e54f756489de8fd0cc84.exetear2⤵PID:1184
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1092-54-0x0000000076691000-0x0000000076693000-memory.dmpFilesize
8KB
-
memory/1092-56-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1184-55-0x0000000000000000-mapping.dmp
-
memory/1184-58-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1184-59-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB