Analysis

  • max time kernel
    130s
  • max time network
    217s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:09

General

  • Target

    6de258fa5d48fee9628f88a930eb2824ef5322adba5c54aa40f415ed78c7b0a6.exe

  • Size

    526KB

  • MD5

    ee79aed7921a4912e0d6ab2e006896f8

  • SHA1

    cf56df8ab049b47957283a7e10606c45390cace5

  • SHA256

    6de258fa5d48fee9628f88a930eb2824ef5322adba5c54aa40f415ed78c7b0a6

  • SHA512

    b4a09e115511ecf46841d1e72cc1090b7ee1b709b079f6df8c731bf6497ea6b39b583a0303189b990310af6a2a36c164a4048ce1e4bfd4d6f3a0dfe03340b5f5

  • SSDEEP

    12288:p8VWCXUy3GqpJVPnxK4uva7y18xQqpx8O5cf:pcJ9r3Pnk54atqpx8D

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6de258fa5d48fee9628f88a930eb2824ef5322adba5c54aa40f415ed78c7b0a6.exe
    "C:\Users\Admin\AppData\Local\Temp\6de258fa5d48fee9628f88a930eb2824ef5322adba5c54aa40f415ed78c7b0a6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:700
    • C:\Users\Admin\AppData\Local\Temp\6de258fa5d48fee9628f88a930eb2824ef5322adba5c54aa40f415ed78c7b0a6.exe
      start
      2⤵
        PID:1132
      • C:\Users\Admin\AppData\Local\Temp\6de258fa5d48fee9628f88a930eb2824ef5322adba5c54aa40f415ed78c7b0a6.exe
        watch
        2⤵
          PID:1500

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/700-55-0x0000000075FF1000-0x0000000075FF3000-memory.dmp

        Filesize

        8KB

      • memory/700-54-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/700-58-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1132-65-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1132-57-0x0000000000000000-mapping.dmp

      • memory/1132-59-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1132-67-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1132-63-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1500-56-0x0000000000000000-mapping.dmp

      • memory/1500-64-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1500-66-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1500-60-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1500-68-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB