Analysis
-
max time kernel
70s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:47
Static task
static1
Behavioral task
behavioral1
Sample
fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe
Resource
win10v2004-20220812-en
General
-
Target
fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe
-
Size
518KB
-
MD5
bd62c9b3d9f3bca351594f38a8f093ec
-
SHA1
bce9997f52a0f0cc275517616de2ea45722274cc
-
SHA256
fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2
-
SHA512
c7fb9868387d45f2d2c97d0d5082ad114e99f5a5f9fe3fd3b8f7905cd5f34b75e25c650f6b66575d26a78076c3a5d5cbcaf145a694acf074d0e79b50012ce91f
-
SSDEEP
12288:Ru/v25JT66KUlbl6bqwYYlLPt5oKnWq3Cb:MnQJT66XlJmlLPt5/WX
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exedescription pid process target process PID 2020 wrote to memory of 1224 2020 fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe PID 2020 wrote to memory of 1224 2020 fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe PID 2020 wrote to memory of 1224 2020 fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe PID 2020 wrote to memory of 1224 2020 fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe PID 2020 wrote to memory of 1224 2020 fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe PID 2020 wrote to memory of 1224 2020 fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe PID 2020 wrote to memory of 1224 2020 fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe PID 2020 wrote to memory of 1456 2020 fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe PID 2020 wrote to memory of 1456 2020 fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe PID 2020 wrote to memory of 1456 2020 fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe PID 2020 wrote to memory of 1456 2020 fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe PID 2020 wrote to memory of 1456 2020 fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe PID 2020 wrote to memory of 1456 2020 fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe PID 2020 wrote to memory of 1456 2020 fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe"C:\Users\Admin\AppData\Local\Temp\fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\fa560d1e51d68ea6ca40d3fee911d533df094667acbd6dab9c04e7e72e1c2df2.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1224-56-0x0000000000000000-mapping.dmp
-
memory/1224-61-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1224-62-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1224-63-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1456-55-0x0000000000000000-mapping.dmp
-
memory/1456-60-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1456-64-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2020-54-0x00000000765A1000-0x00000000765A3000-memory.dmpFilesize
8KB
-
memory/2020-57-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB