Analysis

  • max time kernel
    44s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:15

General

  • Target

    4a79a5da674e2e32d86b83e4efc3fd086a61266c0e14692f48aad3b8c4dd6076.exe

  • Size

    518KB

  • MD5

    113a630af2ed86cd9a855b93ce75e81a

  • SHA1

    f5c3f832d067d45b36deda4ce1d3cd027133ff46

  • SHA256

    4a79a5da674e2e32d86b83e4efc3fd086a61266c0e14692f48aad3b8c4dd6076

  • SHA512

    606f1f5e51ffbc6c37403cb92785154dd80217f0edef1eb3fa0a56ba84952eaf059b6f4273585baf83f68df9808a1332de7bb11deff99866f1d3f798061b6d40

  • SSDEEP

    12288:LFvbNfx4yb93fAPQBrZ8vwYYlLPt5oKnWq3ebB6C:LRRfKGVPrlLPt5/WzB

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a79a5da674e2e32d86b83e4efc3fd086a61266c0e14692f48aad3b8c4dd6076.exe
    "C:\Users\Admin\AppData\Local\Temp\4a79a5da674e2e32d86b83e4efc3fd086a61266c0e14692f48aad3b8c4dd6076.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\4a79a5da674e2e32d86b83e4efc3fd086a61266c0e14692f48aad3b8c4dd6076.exe
      start
      2⤵
        PID:1600
      • C:\Users\Admin\AppData\Local\Temp\4a79a5da674e2e32d86b83e4efc3fd086a61266c0e14692f48aad3b8c4dd6076.exe
        watch
        2⤵
          PID:1628

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1600-56-0x0000000000000000-mapping.dmp
      • memory/1600-60-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/1600-62-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/1600-64-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/1628-55-0x0000000000000000-mapping.dmp
      • memory/1628-61-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/1628-63-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/1628-65-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB

      • memory/2016-54-0x00000000761F1000-0x00000000761F3000-memory.dmp
        Filesize

        8KB

      • memory/2016-57-0x0000000000400000-0x000000000048B000-memory.dmp
        Filesize

        556KB