Analysis

  • max time kernel
    47s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:08

General

  • Target

    722dc25d02f3b6d5593c6a1a236377a40f4d0e44d6c2a3f140aea64da0058e4f.exe

  • Size

    518KB

  • MD5

    060b648e477aedc5f6de6e47ec1c86f8

  • SHA1

    0521b8067f707d3dfbe9453bb8996257d145a94c

  • SHA256

    722dc25d02f3b6d5593c6a1a236377a40f4d0e44d6c2a3f140aea64da0058e4f

  • SHA512

    231f6219a72a80be58d91c0cb0536b5473d686f5b6050f6ed83fc7d93ec4b027e81c02b91559dba1a6362a4d5d075aac55165f31359fdbeb81632704253ac3a0

  • SSDEEP

    12288:9puci03SUibXGjtdXPvKwYYlLPt5oKnWq3i2b:9pun5fSjHlLPt5/WJG

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\722dc25d02f3b6d5593c6a1a236377a40f4d0e44d6c2a3f140aea64da0058e4f.exe
    "C:\Users\Admin\AppData\Local\Temp\722dc25d02f3b6d5593c6a1a236377a40f4d0e44d6c2a3f140aea64da0058e4f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Users\Admin\AppData\Local\Temp\722dc25d02f3b6d5593c6a1a236377a40f4d0e44d6c2a3f140aea64da0058e4f.exe
      start
      2⤵
        PID:1356
      • C:\Users\Admin\AppData\Local\Temp\722dc25d02f3b6d5593c6a1a236377a40f4d0e44d6c2a3f140aea64da0058e4f.exe
        watch
        2⤵
          PID:1952

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1356-56-0x0000000000000000-mapping.dmp
      • memory/1356-60-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/1356-62-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/1364-54-0x0000000075091000-0x0000000075093000-memory.dmp
        Filesize

        8KB

      • memory/1364-57-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/1952-55-0x0000000000000000-mapping.dmp
      • memory/1952-61-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/1952-63-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB