Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:02

General

  • Target

    d2da36c6e452ef43b9cbde93200512939b92b01c107cb6e415eb56d496190e90.exe

  • Size

    518KB

  • MD5

    ebe43824c3f2a05ef7266dba3023eb16

  • SHA1

    38011cf7a37c682cf29bf688e7a50110ade63be8

  • SHA256

    d2da36c6e452ef43b9cbde93200512939b92b01c107cb6e415eb56d496190e90

  • SHA512

    5a9e0b0f24f31ea85826e201a0a4b2a2ef13e63740916f8ab1954eb5ce0afdfe52819a867e6da6dffd1b4a55b66e1f546d02c1653cfeebe4798e4fbdc4fe5a11

  • SSDEEP

    12288:KDWnjCKyQxVlSLwPUjASES/ya+WJPwTOEY/7:Kwof8PuAsz+OPwTvY/

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2da36c6e452ef43b9cbde93200512939b92b01c107cb6e415eb56d496190e90.exe
    "C:\Users\Admin\AppData\Local\Temp\d2da36c6e452ef43b9cbde93200512939b92b01c107cb6e415eb56d496190e90.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Users\Admin\AppData\Local\Temp\d2da36c6e452ef43b9cbde93200512939b92b01c107cb6e415eb56d496190e90.exe
      start
      2⤵
        PID:1044
      • C:\Users\Admin\AppData\Local\Temp\d2da36c6e452ef43b9cbde93200512939b92b01c107cb6e415eb56d496190e90.exe
        watch
        2⤵
          PID:1352

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1044-56-0x0000000000000000-mapping.dmp

      • memory/1044-60-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1044-62-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1352-55-0x0000000000000000-mapping.dmp

      • memory/1352-61-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1352-63-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1604-54-0x0000000075601000-0x0000000075603000-memory.dmp

        Filesize

        8KB

      • memory/1604-57-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB