Analysis
-
max time kernel
36s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:12
Static task
static1
Behavioral task
behavioral1
Sample
1ae79ad739ba14d924cb1f68fe7d12bc49acb5b938e4df42588e8ccb5cc16de9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1ae79ad739ba14d924cb1f68fe7d12bc49acb5b938e4df42588e8ccb5cc16de9.exe
Resource
win10v2004-20221111-en
General
-
Target
1ae79ad739ba14d924cb1f68fe7d12bc49acb5b938e4df42588e8ccb5cc16de9.exe
-
Size
521KB
-
MD5
2e2e0c8b076b901e5980120fffbf5a5f
-
SHA1
a58371eff55432555ea1b6500ad047684aadb349
-
SHA256
1ae79ad739ba14d924cb1f68fe7d12bc49acb5b938e4df42588e8ccb5cc16de9
-
SHA512
d69d041a67aa8f17ba589bbe52a1e6cc059161859ed559a064f77896d5b09ae1a6a1fd96d3a6065a7d49c803ec3dcb94b05e9ff7df08fa2f4222f073f633735f
-
SSDEEP
12288:3rLS60kqEUyxQQbJ3s25Xcjj50vrEl57FhSffL:3K60QURgs25Xij54AfFhSHL
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
1ae79ad739ba14d924cb1f68fe7d12bc49acb5b938e4df42588e8ccb5cc16de9.exedescription pid process target process PID 1368 wrote to memory of 1744 1368 1ae79ad739ba14d924cb1f68fe7d12bc49acb5b938e4df42588e8ccb5cc16de9.exe 1ae79ad739ba14d924cb1f68fe7d12bc49acb5b938e4df42588e8ccb5cc16de9.exe PID 1368 wrote to memory of 1744 1368 1ae79ad739ba14d924cb1f68fe7d12bc49acb5b938e4df42588e8ccb5cc16de9.exe 1ae79ad739ba14d924cb1f68fe7d12bc49acb5b938e4df42588e8ccb5cc16de9.exe PID 1368 wrote to memory of 1744 1368 1ae79ad739ba14d924cb1f68fe7d12bc49acb5b938e4df42588e8ccb5cc16de9.exe 1ae79ad739ba14d924cb1f68fe7d12bc49acb5b938e4df42588e8ccb5cc16de9.exe PID 1368 wrote to memory of 1744 1368 1ae79ad739ba14d924cb1f68fe7d12bc49acb5b938e4df42588e8ccb5cc16de9.exe 1ae79ad739ba14d924cb1f68fe7d12bc49acb5b938e4df42588e8ccb5cc16de9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ae79ad739ba14d924cb1f68fe7d12bc49acb5b938e4df42588e8ccb5cc16de9.exe"C:\Users\Admin\AppData\Local\Temp\1ae79ad739ba14d924cb1f68fe7d12bc49acb5b938e4df42588e8ccb5cc16de9.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1ae79ad739ba14d924cb1f68fe7d12bc49acb5b938e4df42588e8ccb5cc16de9.exetear2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1368-54-0x0000000076301000-0x0000000076303000-memory.dmpFilesize
8KB
-
memory/1368-56-0x0000000000400000-0x000000000048D000-memory.dmpFilesize
564KB
-
memory/1744-55-0x0000000000000000-mapping.dmp
-
memory/1744-58-0x0000000000400000-0x000000000048D000-memory.dmpFilesize
564KB
-
memory/1744-59-0x0000000000400000-0x000000000048D000-memory.dmpFilesize
564KB