Analysis

  • max time kernel
    35s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:20

General

  • Target

    2908c8c20d4b58c3058d51d071eb9df42f5f81fadbe4bc8e8762890f14b037e9.exe

  • Size

    518KB

  • MD5

    a8cdd04f3b48a4d597d1ad6887e8a6a1

  • SHA1

    43c048681d6a0e99bdb20aeb575599bd352b797d

  • SHA256

    2908c8c20d4b58c3058d51d071eb9df42f5f81fadbe4bc8e8762890f14b037e9

  • SHA512

    6170200a9828e858d3903b5e5f37ba3509e294b47004c175ac48da56218c7d301b6dc3d417e3e8ac8517412825cbf5107bb7b0e9e00409066c41b11b62125bc2

  • SSDEEP

    6144:0dyX3Z7fh1TN3rik/Sjyu0cl36Om3Fd+6M+2LJMpRlw75G9+lLPX9MM8e459KOoK:qyX7TPedJ6MPlwwYYlLPt5oKnWq3cb

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2908c8c20d4b58c3058d51d071eb9df42f5f81fadbe4bc8e8762890f14b037e9.exe
    "C:\Users\Admin\AppData\Local\Temp\2908c8c20d4b58c3058d51d071eb9df42f5f81fadbe4bc8e8762890f14b037e9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Users\Admin\AppData\Local\Temp\2908c8c20d4b58c3058d51d071eb9df42f5f81fadbe4bc8e8762890f14b037e9.exe
      start
      2⤵
        PID:672
      • C:\Users\Admin\AppData\Local\Temp\2908c8c20d4b58c3058d51d071eb9df42f5f81fadbe4bc8e8762890f14b037e9.exe
        watch
        2⤵
          PID:1284

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/672-57-0x0000000000000000-mapping.dmp

      • memory/672-62-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/672-63-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1284-56-0x0000000000000000-mapping.dmp

      • memory/1284-61-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1284-64-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1348-54-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1348-55-0x0000000074F41000-0x0000000074F43000-memory.dmp

        Filesize

        8KB

      • memory/1348-58-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB