Analysis

  • max time kernel
    41s
  • max time network
    88s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:47

General

  • Target

    ec60d51e00a77d716ccfd192b0139a38a64427aa0298d2d0e49cd3a59ceaeb11.exe

  • Size

    522KB

  • MD5

    748f941bf4c710d763f73799c15ded2f

  • SHA1

    092637cbf04c04d64dc6d2eb203e48422b5e2cdd

  • SHA256

    ec60d51e00a77d716ccfd192b0139a38a64427aa0298d2d0e49cd3a59ceaeb11

  • SHA512

    510ddd63298f8f25641a3d5d27f2978022bdb75a873d740213893cd0c14e47c1a66c2a7066e03c9f7540ed6bd0418f608ff356c2a9aab52d2c7457ac8ec16543

  • SSDEEP

    6144:eTCEP18PEE1BxdAHKgE5NxT2nnhqLCDfHladZjL3jvmQy1CrxQqD9RSaSz+8O5Xj:H0upFN4nncee33jVy18xQqpx8O5X

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec60d51e00a77d716ccfd192b0139a38a64427aa0298d2d0e49cd3a59ceaeb11.exe
    "C:\Users\Admin\AppData\Local\Temp\ec60d51e00a77d716ccfd192b0139a38a64427aa0298d2d0e49cd3a59ceaeb11.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Users\Admin\AppData\Local\Temp\ec60d51e00a77d716ccfd192b0139a38a64427aa0298d2d0e49cd3a59ceaeb11.exe
      start
      2⤵
        PID:1052
      • C:\Users\Admin\AppData\Local\Temp\ec60d51e00a77d716ccfd192b0139a38a64427aa0298d2d0e49cd3a59ceaeb11.exe
        watch
        2⤵
          PID:2028

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/832-58-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/832-55-0x0000000075291000-0x0000000075293000-memory.dmp
        Filesize

        8KB

      • memory/832-54-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1052-60-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1052-57-0x0000000000000000-mapping.dmp
      • memory/1052-64-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1052-66-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1052-67-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1052-68-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/2028-59-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/2028-56-0x0000000000000000-mapping.dmp
      • memory/2028-63-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/2028-65-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/2028-69-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB