Analysis

  • max time kernel
    42s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:04

General

  • Target

    8928c3a72197bad482b3c3b2d674f59f95361c751615f3ee6477d7189715c1fa.exe

  • Size

    522KB

  • MD5

    d8145b2a4dba69185b72411663abf5c3

  • SHA1

    c81a092bf83ad570c8a3e4f9cab267a1145de809

  • SHA256

    8928c3a72197bad482b3c3b2d674f59f95361c751615f3ee6477d7189715c1fa

  • SHA512

    3f60441d99f6823d9e42668eff4d5a8eecf207cf174eaf1d8dc38b71a6b6e07edb25655a9eb0b70ad0287a5ea5d47c87f5081db25c97df0687137599101042fc

  • SSDEEP

    6144:zWoIrIaTR9jtPL7AAys7G9Or/3ZEJrlkJ5NbHq8NjRiFwzalw75G9+lLPX9MM8eA:yN9/3O7T8Nj4hwYYlLPt5oKnWq3wPbh

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8928c3a72197bad482b3c3b2d674f59f95361c751615f3ee6477d7189715c1fa.exe
    "C:\Users\Admin\AppData\Local\Temp\8928c3a72197bad482b3c3b2d674f59f95361c751615f3ee6477d7189715c1fa.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\8928c3a72197bad482b3c3b2d674f59f95361c751615f3ee6477d7189715c1fa.exe
      start
      2⤵
        PID:1992
      • C:\Users\Admin\AppData\Local\Temp\8928c3a72197bad482b3c3b2d674f59f95361c751615f3ee6477d7189715c1fa.exe
        watch
        2⤵
          PID:364

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/364-55-0x0000000000000000-mapping.dmp

      • memory/364-60-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/364-62-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/364-65-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1240-54-0x00000000760B1000-0x00000000760B3000-memory.dmp

        Filesize

        8KB

      • memory/1240-57-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1992-56-0x0000000000000000-mapping.dmp

      • memory/1992-61-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1992-63-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1992-64-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB