Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:40
Static task
static1
Behavioral task
behavioral1
Sample
f728e6a3d93cf898ce9a2988b9be0ea0f97339d582c7ca89ceb3443fcf60fb2f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f728e6a3d93cf898ce9a2988b9be0ea0f97339d582c7ca89ceb3443fcf60fb2f.exe
Resource
win10v2004-20220812-en
General
-
Target
f728e6a3d93cf898ce9a2988b9be0ea0f97339d582c7ca89ceb3443fcf60fb2f.exe
-
Size
524KB
-
MD5
7dae8726a9e101e8a1170dcb72c47dae
-
SHA1
26348be302e39d2813fe77e5f3354ea161df1335
-
SHA256
f728e6a3d93cf898ce9a2988b9be0ea0f97339d582c7ca89ceb3443fcf60fb2f
-
SHA512
9838414fd6742ddcaf831eb4531be6ed9d6dff8d64bd05e4b15ddf0eb9f36ea28c6dccfb3ae66f1aaf67826a56b5ba0c21eadbd5b632f81c60581a4bfe77db6a
-
SSDEEP
12288:CzAMtjU5W32gzF+6ZWyqtVzvBVKXCuapzDBGn:CzcuPjvIVzvSXCXD
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
f728e6a3d93cf898ce9a2988b9be0ea0f97339d582c7ca89ceb3443fcf60fb2f.exedescription pid process target process PID 1896 wrote to memory of 2016 1896 f728e6a3d93cf898ce9a2988b9be0ea0f97339d582c7ca89ceb3443fcf60fb2f.exe f728e6a3d93cf898ce9a2988b9be0ea0f97339d582c7ca89ceb3443fcf60fb2f.exe PID 1896 wrote to memory of 2016 1896 f728e6a3d93cf898ce9a2988b9be0ea0f97339d582c7ca89ceb3443fcf60fb2f.exe f728e6a3d93cf898ce9a2988b9be0ea0f97339d582c7ca89ceb3443fcf60fb2f.exe PID 1896 wrote to memory of 2016 1896 f728e6a3d93cf898ce9a2988b9be0ea0f97339d582c7ca89ceb3443fcf60fb2f.exe f728e6a3d93cf898ce9a2988b9be0ea0f97339d582c7ca89ceb3443fcf60fb2f.exe PID 1896 wrote to memory of 2016 1896 f728e6a3d93cf898ce9a2988b9be0ea0f97339d582c7ca89ceb3443fcf60fb2f.exe f728e6a3d93cf898ce9a2988b9be0ea0f97339d582c7ca89ceb3443fcf60fb2f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f728e6a3d93cf898ce9a2988b9be0ea0f97339d582c7ca89ceb3443fcf60fb2f.exe"C:\Users\Admin\AppData\Local\Temp\f728e6a3d93cf898ce9a2988b9be0ea0f97339d582c7ca89ceb3443fcf60fb2f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\f728e6a3d93cf898ce9a2988b9be0ea0f97339d582c7ca89ceb3443fcf60fb2f.exetear2⤵PID:2016
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1896-54-0x0000000075201000-0x0000000075203000-memory.dmpFilesize
8KB
-
memory/1896-56-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/2016-55-0x0000000000000000-mapping.dmp
-
memory/2016-58-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/2016-59-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/2016-60-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB