Analysis

  • max time kernel
    46s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:03

General

  • Target

    8ef4fb89ed9479aff6786673d635d2e1311a9962636d943d73f558741b7945a4.exe

  • Size

    522KB

  • MD5

    627969e60ce9f7a5da3dea3578fc701b

  • SHA1

    d69cccdf221a2bf8b0b6e4bea543ac28bdf909e0

  • SHA256

    8ef4fb89ed9479aff6786673d635d2e1311a9962636d943d73f558741b7945a4

  • SHA512

    c54873dd8c26bc70b93ec4adda0f98740980df4765c95ab72ee2ac7ec90e7294504cde5639aa88b760d643318553ad1f00a9652786e4eae0ffae0d3eb11323e7

  • SSDEEP

    6144:j1UpLgKU5xDGAh8xuzoC+rpwRFy089T8Wjlb7BeuQmQy1CrxQqD9RSaSz+8O5ook:sruGEsu7NDuGM/Bety18xQqpx8O5oU

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ef4fb89ed9479aff6786673d635d2e1311a9962636d943d73f558741b7945a4.exe
    "C:\Users\Admin\AppData\Local\Temp\8ef4fb89ed9479aff6786673d635d2e1311a9962636d943d73f558741b7945a4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\8ef4fb89ed9479aff6786673d635d2e1311a9962636d943d73f558741b7945a4.exe
      start
      2⤵
        PID:1000
      • C:\Users\Admin\AppData\Local\Temp\8ef4fb89ed9479aff6786673d635d2e1311a9962636d943d73f558741b7945a4.exe
        watch
        2⤵
          PID:1092

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1000-57-0x0000000000000000-mapping.dmp
      • memory/1000-59-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1000-63-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1000-65-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1092-56-0x0000000000000000-mapping.dmp
      • memory/1092-60-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1092-64-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1092-66-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1672-54-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1672-55-0x0000000075201000-0x0000000075203000-memory.dmp
        Filesize

        8KB

      • memory/1672-58-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB