Analysis

  • max time kernel
    38s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:52

General

  • Target

    e3a95d4aacf8e4b6e857d47af80e1aa9ea88f9cb2677bddf6678ce73e6c70426.exe

  • Size

    522KB

  • MD5

    7fe52fe5ef1302d581b1d84cb6f8dd42

  • SHA1

    6adcc64fe132f5183a52c26d3eb7efb6f642f143

  • SHA256

    e3a95d4aacf8e4b6e857d47af80e1aa9ea88f9cb2677bddf6678ce73e6c70426

  • SHA512

    cbbffddc223192c62538582f9793c8ca8d3debcf4d8e0433db2581a1b14d5c8d1fd30e73ca2f9a5f0f126a09754ce9806a71352c7b9abdbde0cdd58e250731a1

  • SSDEEP

    6144:VxQOqZI3n1g4u311tOZk1QgC9oY6A7EsUddBZZb2bx3sjcT1m4sBbITwBH/kvSU+:V0SgTO++6A9UzZ+Su1jsuTw5iivWxB

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3a95d4aacf8e4b6e857d47af80e1aa9ea88f9cb2677bddf6678ce73e6c70426.exe
    "C:\Users\Admin\AppData\Local\Temp\e3a95d4aacf8e4b6e857d47af80e1aa9ea88f9cb2677bddf6678ce73e6c70426.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\Users\Admin\AppData\Local\Temp\e3a95d4aacf8e4b6e857d47af80e1aa9ea88f9cb2677bddf6678ce73e6c70426.exe
      start
      2⤵
        PID:1920
      • C:\Users\Admin\AppData\Local\Temp\e3a95d4aacf8e4b6e857d47af80e1aa9ea88f9cb2677bddf6678ce73e6c70426.exe
        watch
        2⤵
          PID:1696

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1132-54-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1132-55-0x0000000075561000-0x0000000075563000-memory.dmp

        Filesize

        8KB

      • memory/1132-60-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1696-56-0x0000000000000000-mapping.dmp

      • memory/1696-61-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1696-65-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1920-57-0x0000000000000000-mapping.dmp

      • memory/1920-62-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1920-63-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1920-64-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB