Analysis

  • max time kernel
    27s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:23

General

  • Target

    16ed4319fae890964742c9d77889c40978a1aede4852b6774846082c350725d6.exe

  • Size

    518KB

  • MD5

    72a7e812398e0d642c3015575142b323

  • SHA1

    8f4e877605a353737769060a38ceef0c792834f7

  • SHA256

    16ed4319fae890964742c9d77889c40978a1aede4852b6774846082c350725d6

  • SHA512

    567de29aa8837c13318c59ca3c896384e354da8a4ca3d66ab1da082b9b65109b769540027ded0a8dabf8a8f366bb03132023beb64532ca003603f27eeb0395be

  • SSDEEP

    12288:A+tQgbPGs8r/WoEbGIy9yZ32X9wYYlLPt5oKnWq3Xbb:XQgbUr+oqyA32alLPt5/Web

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16ed4319fae890964742c9d77889c40978a1aede4852b6774846082c350725d6.exe
    "C:\Users\Admin\AppData\Local\Temp\16ed4319fae890964742c9d77889c40978a1aede4852b6774846082c350725d6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\16ed4319fae890964742c9d77889c40978a1aede4852b6774846082c350725d6.exe
      start
      2⤵
        PID:904
      • C:\Users\Admin\AppData\Local\Temp\16ed4319fae890964742c9d77889c40978a1aede4852b6774846082c350725d6.exe
        watch
        2⤵
          PID:980

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/904-56-0x0000000000000000-mapping.dmp

      • memory/904-61-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/904-63-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/904-64-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/980-55-0x0000000000000000-mapping.dmp

      • memory/980-60-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/980-62-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/980-65-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1632-54-0x0000000075B41000-0x0000000075B43000-memory.dmp

        Filesize

        8KB

      • memory/1632-57-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB