Analysis
-
max time kernel
42s -
max time network
83s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:11
Static task
static1
Behavioral task
behavioral1
Sample
6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe
Resource
win10v2004-20220901-en
General
-
Target
6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe
-
Size
526KB
-
MD5
58d3241b4910122be4c4ef2b50b37c9b
-
SHA1
9fea23490c2c92a7536ba5e9ea58696fcf0d0891
-
SHA256
6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265
-
SHA512
29ca35aec6d2ea99aaf619d95fb92b28b218697aed1c4623fc4fcfe02e8afca14e46b6851d30552d49508390f1d44ef8783f92471a3b2259a441d153a596e615
-
SSDEEP
6144:qd/+vS1iiOaXruNQFmg7QHw8v5EzBJ5Tah4wt13ykc3pmQy1CrxQqD9RSaSz+8OW:YUSwva+Tm7y18xQqpx8O5ajl
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exedescription pid process target process PID 944 wrote to memory of 1700 944 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe PID 944 wrote to memory of 1700 944 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe PID 944 wrote to memory of 1700 944 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe PID 944 wrote to memory of 1700 944 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe PID 944 wrote to memory of 1700 944 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe PID 944 wrote to memory of 1700 944 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe PID 944 wrote to memory of 1700 944 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe PID 944 wrote to memory of 1176 944 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe PID 944 wrote to memory of 1176 944 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe PID 944 wrote to memory of 1176 944 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe PID 944 wrote to memory of 1176 944 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe PID 944 wrote to memory of 1176 944 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe PID 944 wrote to memory of 1176 944 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe PID 944 wrote to memory of 1176 944 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe 6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe"C:\Users\Admin\AppData\Local\Temp\6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\6055a56b399c17366b2b50f5a36160aaafbd3c2b4a0eccf3f5ceb095499c4265.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/944-55-0x0000000075931000-0x0000000075933000-memory.dmpFilesize
8KB
-
memory/944-54-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/944-58-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1176-65-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1176-56-0x0000000000000000-mapping.dmp
-
memory/1176-59-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1176-69-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1176-63-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1700-57-0x0000000000000000-mapping.dmp
-
memory/1700-64-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1700-66-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1700-67-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1700-68-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1700-60-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB