Analysis

  • max time kernel
    240s
  • max time network
    337s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:08

General

  • Target

    714af4ac48df646df9fca4fc4ac5c6f8587f79d43e8d2f7deec4f67b2cc7aac6.exe

  • Size

    518KB

  • MD5

    3ff73af605e2707be38cfa7e7a663791

  • SHA1

    d9f1d4a3ffc56ff15f76dccafb1ae392fa08c944

  • SHA256

    714af4ac48df646df9fca4fc4ac5c6f8587f79d43e8d2f7deec4f67b2cc7aac6

  • SHA512

    0a75c6f686181465dca4d264825f99316ba15cb6b806fe7890f489ff399c0ff7463d7730afc2416975312a0c55abf57af2adef33bdf5053c5d1d4fc11e655777

  • SSDEEP

    12288:q/LUh610i+yDBNiI2lwYYlLPt5oKnWq3tbl:q/Q61ZNBNzlLPt5/Wcl

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\714af4ac48df646df9fca4fc4ac5c6f8587f79d43e8d2f7deec4f67b2cc7aac6.exe
    "C:\Users\Admin\AppData\Local\Temp\714af4ac48df646df9fca4fc4ac5c6f8587f79d43e8d2f7deec4f67b2cc7aac6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:668
    • C:\Users\Admin\AppData\Local\Temp\714af4ac48df646df9fca4fc4ac5c6f8587f79d43e8d2f7deec4f67b2cc7aac6.exe
      start
      2⤵
        PID:568
      • C:\Users\Admin\AppData\Local\Temp\714af4ac48df646df9fca4fc4ac5c6f8587f79d43e8d2f7deec4f67b2cc7aac6.exe
        watch
        2⤵
          PID:1856

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/568-57-0x0000000000000000-mapping.dmp
      • memory/568-61-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/568-63-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/668-54-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/668-55-0x0000000075D11000-0x0000000075D13000-memory.dmp
        Filesize

        8KB

      • memory/668-58-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/1856-56-0x0000000000000000-mapping.dmp
      • memory/1856-62-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/1856-64-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB