Analysis
-
max time kernel
85s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:48
Static task
static1
Behavioral task
behavioral1
Sample
f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe
Resource
win10v2004-20221111-en
General
-
Target
f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe
-
Size
522KB
-
MD5
2b4c599f18657157d4c92f77ff0ba6df
-
SHA1
d2e49201e3d9c766ea1a1419308d9fb11452d164
-
SHA256
f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db
-
SHA512
b60dc13c90e5ddaa9a59919647c0d748bec20ff01682620d082a856d59c99a8b4a37e8f2a21cc6683126a258ec7b3283c4dc603a529d8d46e8b5a47b8bbb9994
-
SSDEEP
6144:FU9E1zPGNuXaaECgqeN9vPqYfKKD17690Mm8V8CQ1MQ6ibmQy1CrxQqD9RSaSz+W:/zPG0DgiY8kxCJ1qy18xQqpx8O5L
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exedescription pid process target process PID 580 wrote to memory of 548 580 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 580 wrote to memory of 548 580 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 580 wrote to memory of 548 580 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 580 wrote to memory of 548 580 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 580 wrote to memory of 548 580 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 580 wrote to memory of 548 580 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 580 wrote to memory of 548 580 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 580 wrote to memory of 1112 580 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 580 wrote to memory of 1112 580 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 580 wrote to memory of 1112 580 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 580 wrote to memory of 1112 580 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 580 wrote to memory of 1112 580 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 580 wrote to memory of 1112 580 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe PID 580 wrote to memory of 1112 580 f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe"C:\Users\Admin\AppData\Local\Temp\f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\f57eec8c8d618388a9771d16d29d0e9e6d92e569b20742828fd660abe3a8d3db.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/548-58-0x0000000000000000-mapping.dmp
-
memory/548-60-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/548-65-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/548-66-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/580-54-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/580-55-0x00000000767D1000-0x00000000767D3000-memory.dmpFilesize
8KB
-
memory/580-56-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/580-59-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1112-57-0x0000000000000000-mapping.dmp
-
memory/1112-61-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1112-64-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1112-67-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB