Analysis

  • max time kernel
    42s
  • max time network
    66s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:46

General

  • Target

    eded876a3d505ecfa9498bcb1df70391a782f90b3fe5c2a5790165a4483329e2.exe

  • Size

    524KB

  • MD5

    6cc797e10e70482064bcd9a3faf53119

  • SHA1

    ed9ffd54a4f32070dabedfa129030109624c9c84

  • SHA256

    eded876a3d505ecfa9498bcb1df70391a782f90b3fe5c2a5790165a4483329e2

  • SHA512

    70c966d320d00aa41696ae6d82a5d6388fa5d4e8ede339b4627daec0decdfbf99bfa9fa7dc8e1c9dfb0eb09d4563a3c6b86244483beb3f2a38fe7383363da883

  • SSDEEP

    12288:bNt+TSnrkC8At8xgQ/n0VzvBVKXCuapzDBG:biT8rkV//0VzvSXCXD

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eded876a3d505ecfa9498bcb1df70391a782f90b3fe5c2a5790165a4483329e2.exe
    "C:\Users\Admin\AppData\Local\Temp\eded876a3d505ecfa9498bcb1df70391a782f90b3fe5c2a5790165a4483329e2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\eded876a3d505ecfa9498bcb1df70391a782f90b3fe5c2a5790165a4483329e2.exe
      tear
      2⤵
        PID:1004

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1004-55-0x0000000000000000-mapping.dmp

    • memory/1004-58-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/1004-59-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/1004-60-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/2044-54-0x0000000075881000-0x0000000075883000-memory.dmp

      Filesize

      8KB

    • memory/2044-56-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB