Analysis
-
max time kernel
68s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:11
Static task
static1
Behavioral task
behavioral1
Sample
65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe
Resource
win10v2004-20221111-en
General
-
Target
65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe
-
Size
526KB
-
MD5
8a1c78b034f52d80107038795c1847d8
-
SHA1
46491e9048ce7dc35dda085857c3c1890b2c81df
-
SHA256
65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990
-
SHA512
506eba138f7c4cb69ceaadeaabe91437b5157f17f77f9c8ba4895e8908c69c690e8b8a251d6697eee00a6bbe6a274b6e66aea4cb01f4f1c7afdb0df234861e2a
-
SSDEEP
12288:MWqdKGvk0bmQFj2X9why18xQqpx8O5Nj6Jq:MW6zv9FjRatqpx8w6Jq
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exedescription pid process target process PID 316 wrote to memory of 944 316 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe PID 316 wrote to memory of 944 316 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe PID 316 wrote to memory of 944 316 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe PID 316 wrote to memory of 944 316 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe PID 316 wrote to memory of 944 316 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe PID 316 wrote to memory of 944 316 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe PID 316 wrote to memory of 944 316 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe PID 316 wrote to memory of 636 316 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe PID 316 wrote to memory of 636 316 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe PID 316 wrote to memory of 636 316 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe PID 316 wrote to memory of 636 316 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe PID 316 wrote to memory of 636 316 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe PID 316 wrote to memory of 636 316 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe PID 316 wrote to memory of 636 316 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe 65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe"C:\Users\Admin\AppData\Local\Temp\65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\65140e798ae323f30d6a62331795b7a10aec810e08c4183276d52f1d7722a990.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/316-54-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/316-55-0x00000000765A1000-0x00000000765A3000-memory.dmpFilesize
8KB
-
memory/316-58-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/636-56-0x0000000000000000-mapping.dmp
-
memory/636-60-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/636-64-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/636-66-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/944-57-0x0000000000000000-mapping.dmp
-
memory/944-59-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/944-63-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/944-65-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB