Analysis

  • max time kernel
    35s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:07

General

  • Target

    768b2d49ae6d765ffe69a5b68d745d79b60afc0862f96a7940caab010311c528.exe

  • Size

    522KB

  • MD5

    80d5ba9d10dba4ae9892087c07a13950

  • SHA1

    90945070f04b7ad73432dad88528ab98bb96c0b4

  • SHA256

    768b2d49ae6d765ffe69a5b68d745d79b60afc0862f96a7940caab010311c528

  • SHA512

    5f0b99c4fdd87d1d6855547f370e802e67c0ba0f1e315b134f3944f1445d7ebd9c88f7ff41be3e2ee0278589c9d608dd80fe423779d13506c815ee9f4c76ccbb

  • SSDEEP

    12288:wQJs8QaELwgvdfPyyS4tZwYYlLPt5oKnWq3jPb/:RJs8TE0gv9BWlLPt5/Wy/

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\768b2d49ae6d765ffe69a5b68d745d79b60afc0862f96a7940caab010311c528.exe
    "C:\Users\Admin\AppData\Local\Temp\768b2d49ae6d765ffe69a5b68d745d79b60afc0862f96a7940caab010311c528.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1552
    • C:\Users\Admin\AppData\Local\Temp\768b2d49ae6d765ffe69a5b68d745d79b60afc0862f96a7940caab010311c528.exe
      start
      2⤵
        PID:1452
      • C:\Users\Admin\AppData\Local\Temp\768b2d49ae6d765ffe69a5b68d745d79b60afc0862f96a7940caab010311c528.exe
        watch
        2⤵
          PID:1432

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1432-55-0x0000000000000000-mapping.dmp

      • memory/1432-60-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1432-63-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1452-56-0x0000000000000000-mapping.dmp

      • memory/1452-61-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1452-62-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1552-54-0x0000000075781000-0x0000000075783000-memory.dmp

        Filesize

        8KB

      • memory/1552-57-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB