Analysis

  • max time kernel
    42s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:21

General

  • Target

    24a4f70233a9c6cf45892af208f5d234ca7a1cde0f5842b03c94a54f936ab052.exe

  • Size

    522KB

  • MD5

    f7dbb91f11ae71689519e8b5d1290559

  • SHA1

    d2951d0cb4236f8783183837cb9114c38136b42f

  • SHA256

    24a4f70233a9c6cf45892af208f5d234ca7a1cde0f5842b03c94a54f936ab052

  • SHA512

    1f74f7aa71a8df8c4af202a12e5406b7288dac5c8c8607a28ad0a92b74e4e73e9e3b98fb701b6d75d2f30784c1f3a0b9297fc310feee3840441a4e2a49758e16

  • SSDEEP

    12288:YvLAOa7DGysd3krZz+ijy18xQqpx8O5mx:Y0OV7WrZzatqpx87

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24a4f70233a9c6cf45892af208f5d234ca7a1cde0f5842b03c94a54f936ab052.exe
    "C:\Users\Admin\AppData\Local\Temp\24a4f70233a9c6cf45892af208f5d234ca7a1cde0f5842b03c94a54f936ab052.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\24a4f70233a9c6cf45892af208f5d234ca7a1cde0f5842b03c94a54f936ab052.exe
      start
      2⤵
        PID:1336
      • C:\Users\Admin\AppData\Local\Temp\24a4f70233a9c6cf45892af208f5d234ca7a1cde0f5842b03c94a54f936ab052.exe
        watch
        2⤵
          PID:1360

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1336-57-0x0000000000000000-mapping.dmp

      • memory/1336-60-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1336-64-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1336-65-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1360-56-0x0000000000000000-mapping.dmp

      • memory/1360-59-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1360-63-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1360-66-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1516-54-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1516-55-0x0000000075F01000-0x0000000075F03000-memory.dmp

        Filesize

        8KB

      • memory/1516-58-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB