Analysis

  • max time kernel
    63s
  • max time network
    70s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:36

General

  • Target

    fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe

  • Size

    533KB

  • MD5

    a210b3c39a94299cffb2193f5da42c7c

  • SHA1

    9e389d6591c2f2d9c2dcaf0e2548bc843444ec9a

  • SHA256

    fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25

  • SHA512

    861a56a54a23515abced971be33cd03f9d02f23db2a85a8210f4363d5ec82f435f7db4ed381256ede317a9906b40cdae9dae445c296eab1762af3bbd9f774a67

  • SSDEEP

    6144:znIqTgLHwMBW2HL+pmxjU0nNvNOHPQXnj80bVmFXSgOgZGK8JU4yk7owH9OgmBef:zI2gLQPz90NvNMEmNfqJU4bbmRHwzq

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe
    "C:\Users\Admin\AppData\Local\Temp\fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Users\Admin\AppData\Local\Temp\fe28b97fa4dfd7de0d57d84891e88a8cd5c607af4716136c7e3b80155ac7be25.exe
      tear
      2⤵
        PID:596

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/596-55-0x0000000000000000-mapping.dmp

    • memory/596-58-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/596-59-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1252-54-0x00000000760D1000-0x00000000760D3000-memory.dmp

      Filesize

      8KB

    • memory/1252-56-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB