Analysis
-
max time kernel
14s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:58
Static task
static1
Behavioral task
behavioral1
Sample
d89dd9a98bc4438c6c6f9bb2d0f4ca8ffff6216f449e7bf623adb577b9fd3083.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d89dd9a98bc4438c6c6f9bb2d0f4ca8ffff6216f449e7bf623adb577b9fd3083.exe
Resource
win10v2004-20220901-en
General
-
Target
d89dd9a98bc4438c6c6f9bb2d0f4ca8ffff6216f449e7bf623adb577b9fd3083.exe
-
Size
530KB
-
MD5
ad05109459a5f1e75f16a91ad2ee02d9
-
SHA1
81100d3dbd7f8b32a6b59a060636439f913d950a
-
SHA256
d89dd9a98bc4438c6c6f9bb2d0f4ca8ffff6216f449e7bf623adb577b9fd3083
-
SHA512
e29d73295aad9cc162ef1395035f25661ce6ec0cffb779555dffc87acc12484750dbf29215f15ce6f6adc7787a5d55c8217a432f12a4931e88baf1c1e6cfca78
-
SSDEEP
12288:uJlR9cT0KtXXDBJxnlhPcMwExjczNGZspc1mmIFGtJaY1bZ:8X2j9Bl/wExjczsZspc1mmDtJN
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
d89dd9a98bc4438c6c6f9bb2d0f4ca8ffff6216f449e7bf623adb577b9fd3083.exedescription pid process target process PID 1980 wrote to memory of 1044 1980 d89dd9a98bc4438c6c6f9bb2d0f4ca8ffff6216f449e7bf623adb577b9fd3083.exe d89dd9a98bc4438c6c6f9bb2d0f4ca8ffff6216f449e7bf623adb577b9fd3083.exe PID 1980 wrote to memory of 1044 1980 d89dd9a98bc4438c6c6f9bb2d0f4ca8ffff6216f449e7bf623adb577b9fd3083.exe d89dd9a98bc4438c6c6f9bb2d0f4ca8ffff6216f449e7bf623adb577b9fd3083.exe PID 1980 wrote to memory of 1044 1980 d89dd9a98bc4438c6c6f9bb2d0f4ca8ffff6216f449e7bf623adb577b9fd3083.exe d89dd9a98bc4438c6c6f9bb2d0f4ca8ffff6216f449e7bf623adb577b9fd3083.exe PID 1980 wrote to memory of 1044 1980 d89dd9a98bc4438c6c6f9bb2d0f4ca8ffff6216f449e7bf623adb577b9fd3083.exe d89dd9a98bc4438c6c6f9bb2d0f4ca8ffff6216f449e7bf623adb577b9fd3083.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d89dd9a98bc4438c6c6f9bb2d0f4ca8ffff6216f449e7bf623adb577b9fd3083.exe"C:\Users\Admin\AppData\Local\Temp\d89dd9a98bc4438c6c6f9bb2d0f4ca8ffff6216f449e7bf623adb577b9fd3083.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d89dd9a98bc4438c6c6f9bb2d0f4ca8ffff6216f449e7bf623adb577b9fd3083.exetear2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1044-55-0x0000000000000000-mapping.dmp
-
memory/1044-58-0x0000000000400000-0x0000000000490000-memory.dmpFilesize
576KB
-
memory/1044-59-0x0000000000400000-0x0000000000490000-memory.dmpFilesize
576KB
-
memory/1980-54-0x0000000075F61000-0x0000000075F63000-memory.dmpFilesize
8KB
-
memory/1980-57-0x0000000000400000-0x0000000000490000-memory.dmpFilesize
576KB