Analysis

  • max time kernel
    48s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:12

General

  • Target

    5dee8cdb66f4f8bf1e60b692355315ba80219ebe46563dd590db658fe36de90a.exe

  • Size

    526KB

  • MD5

    87a3bcc1d719cb98f961d72fac0db8f7

  • SHA1

    58cdd119cec1405d38d25d4359e951881be065dc

  • SHA256

    5dee8cdb66f4f8bf1e60b692355315ba80219ebe46563dd590db658fe36de90a

  • SHA512

    cfa832e9b8d84f08db23be5e469e72d0c7598b89a4db73417231f9b1af1cc52772e77f5431f360bbdbdff9d16defc8087290f6eec5a1b6ef6ec12fa410e0704b

  • SSDEEP

    12288:GONJIgEyuLBpBDxASSm9EK+by18xQqpx8O5Kyc:HPxEXfBVAo2natqpx8D

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5dee8cdb66f4f8bf1e60b692355315ba80219ebe46563dd590db658fe36de90a.exe
    "C:\Users\Admin\AppData\Local\Temp\5dee8cdb66f4f8bf1e60b692355315ba80219ebe46563dd590db658fe36de90a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Users\Admin\AppData\Local\Temp\5dee8cdb66f4f8bf1e60b692355315ba80219ebe46563dd590db658fe36de90a.exe
      start
      2⤵
        PID:1416
      • C:\Users\Admin\AppData\Local\Temp\5dee8cdb66f4f8bf1e60b692355315ba80219ebe46563dd590db658fe36de90a.exe
        watch
        2⤵
          PID:1364

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1328-54-0x0000000075E11000-0x0000000075E13000-memory.dmp

        Filesize

        8KB

      • memory/1328-56-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1328-58-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1364-55-0x0000000000000000-mapping.dmp

      • memory/1364-59-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1364-63-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1364-66-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1416-57-0x0000000000000000-mapping.dmp

      • memory/1416-60-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1416-64-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1416-65-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB