Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:22
Static task
static1
Behavioral task
behavioral1
Sample
1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe
Resource
win10v2004-20220812-en
General
-
Target
1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe
-
Size
518KB
-
MD5
7e4fde72af824716287d22c5b46c62b4
-
SHA1
571ddb200bb8e2c1059a55f7dfb7847175c8ad0e
-
SHA256
1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917
-
SHA512
0a3d93370107c79e3b17be1bd40416d7e2f845b7229078d49120e9c742a29e4265a0e0f791eee63d88745dcafcbb798c60bbfae7e72729a0b15ce63f00fa807c
-
SSDEEP
12288:q46/gUdHlZozc/mpEfewYYlLPt5oKnWq3uEOb:K4UZlOc/dXlLPt5/Ww+
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exedescription pid process target process PID 1380 wrote to memory of 1288 1380 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe PID 1380 wrote to memory of 1288 1380 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe PID 1380 wrote to memory of 1288 1380 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe PID 1380 wrote to memory of 1288 1380 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe PID 1380 wrote to memory of 1288 1380 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe PID 1380 wrote to memory of 1288 1380 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe PID 1380 wrote to memory of 1288 1380 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe PID 1380 wrote to memory of 1188 1380 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe PID 1380 wrote to memory of 1188 1380 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe PID 1380 wrote to memory of 1188 1380 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe PID 1380 wrote to memory of 1188 1380 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe PID 1380 wrote to memory of 1188 1380 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe PID 1380 wrote to memory of 1188 1380 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe PID 1380 wrote to memory of 1188 1380 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe 1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe"C:\Users\Admin\AppData\Local\Temp\1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\1aa5e682d0a2cc3bfeebbb6e48fc2b6ed4b99bb0ef1d715a1e117785f74dd917.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1188-55-0x0000000000000000-mapping.dmp
-
memory/1188-60-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1188-63-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1288-56-0x0000000000000000-mapping.dmp
-
memory/1288-61-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1288-62-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1380-54-0x00000000757A1000-0x00000000757A3000-memory.dmpFilesize
8KB
-
memory/1380-57-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB