Analysis
-
max time kernel
42s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:12
Static task
static1
Behavioral task
behavioral1
Sample
5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe
Resource
win10v2004-20221111-en
General
-
Target
5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe
-
Size
522KB
-
MD5
29eb15dd12befdfde39a0e1585ffa14f
-
SHA1
824c465dc653236e5ba80eb272a917ddb6a1cb8a
-
SHA256
5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33
-
SHA512
7839a38fd0b6cf2d6ee50c5121ef5e7d5bf69cca3cf8f8191c152581a17c3bfd1e69aa9f3bc9f9ff1f532b2e94b2fa944b0b8717db09e9a6f06914cac9217955
-
SSDEEP
6144:NaJtcWoDDPqtwfHtujFZRTcYrVMALNTkKmQy1CrxQqD9RSaSz+8O5vuxe:wJ1ePjfgDRoYSETkSy18xQqpx8O5v
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exedescription pid process target process PID 1512 wrote to memory of 948 1512 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe PID 1512 wrote to memory of 948 1512 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe PID 1512 wrote to memory of 948 1512 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe PID 1512 wrote to memory of 948 1512 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe PID 1512 wrote to memory of 948 1512 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe PID 1512 wrote to memory of 948 1512 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe PID 1512 wrote to memory of 948 1512 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe PID 1512 wrote to memory of 932 1512 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe PID 1512 wrote to memory of 932 1512 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe PID 1512 wrote to memory of 932 1512 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe PID 1512 wrote to memory of 932 1512 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe PID 1512 wrote to memory of 932 1512 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe PID 1512 wrote to memory of 932 1512 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe PID 1512 wrote to memory of 932 1512 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe 5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe"C:\Users\Admin\AppData\Local\Temp\5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\5cc50d0f9698d261a2a6f62c30ac05c7f719882ac788540327480fe50fbd7d33.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/932-56-0x0000000000000000-mapping.dmp
-
memory/932-59-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/932-64-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/932-67-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/948-57-0x0000000000000000-mapping.dmp
-
memory/948-60-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/948-63-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/948-65-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/948-66-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1512-54-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1512-55-0x0000000074DA1000-0x0000000074DA3000-memory.dmpFilesize
8KB
-
memory/1512-58-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB