Analysis
-
max time kernel
32s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:49
Static task
static1
Behavioral task
behavioral1
Sample
ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe
Resource
win10v2004-20221111-en
General
-
Target
ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe
-
Size
522KB
-
MD5
cae07e6af5399584f12c23a0294cc541
-
SHA1
da7853818cb2faff721cbed462765bc9371d803a
-
SHA256
ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66
-
SHA512
30217f6c5f1dbd8e44821b5978e12f2dd54d3032ac4b6cc3a662450952789b3563e82d7d822c45e3df6b673a9bd3a5e30d64dce56ff48c2efcd7d8dba7154b06
-
SSDEEP
12288:2QKVzFPZiuYGFf8n00gzTypy18xQqpx8O5x:2jVzFPr/Fkn05Eatqpx8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exedescription pid process target process PID 976 wrote to memory of 932 976 ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe PID 976 wrote to memory of 932 976 ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe PID 976 wrote to memory of 932 976 ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe PID 976 wrote to memory of 932 976 ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe PID 976 wrote to memory of 932 976 ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe PID 976 wrote to memory of 932 976 ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe PID 976 wrote to memory of 932 976 ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe PID 976 wrote to memory of 1048 976 ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe PID 976 wrote to memory of 1048 976 ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe PID 976 wrote to memory of 1048 976 ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe PID 976 wrote to memory of 1048 976 ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe PID 976 wrote to memory of 1048 976 ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe PID 976 wrote to memory of 1048 976 ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe PID 976 wrote to memory of 1048 976 ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe"C:\Users\Admin\AppData\Local\Temp\ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\ef194f1db964fa221e432071835bfa7d09146d6b50a330fc76fba2e1ab834b66.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/932-56-0x0000000000000000-mapping.dmp
-
memory/932-58-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/932-62-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/932-64-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/976-54-0x0000000075A81000-0x0000000075A83000-memory.dmpFilesize
8KB
-
memory/976-57-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1048-55-0x0000000000000000-mapping.dmp
-
memory/1048-59-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1048-63-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1048-65-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB