Analysis

  • max time kernel
    47s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:43

General

  • Target

    8b3b24070a3d3e064c022c84d032405975f0764ff59ac3035709a58f3368d480.exe

  • Size

    530KB

  • MD5

    dc7a8052e29798feccad515b8a67798d

  • SHA1

    80a82b771031058c1b3e8dd9b3a0bca59a286780

  • SHA256

    8b3b24070a3d3e064c022c84d032405975f0764ff59ac3035709a58f3368d480

  • SHA512

    1db28301c40077dbbdcf9cb96bcc968098cd6aa3e34ccf6a3029e0830f79344e0caba576f302e2e5b71ca509273e0f6c6a61c32783d273141348a34a4ca8079b

  • SSDEEP

    12288:/KGqvvsNDGFSWqd+hbl3zNGZspc1mmIFGtJaY1b0Q:/KGqns9ty3zsZspc1mmDtJN3

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b3b24070a3d3e064c022c84d032405975f0764ff59ac3035709a58f3368d480.exe
    "C:\Users\Admin\AppData\Local\Temp\8b3b24070a3d3e064c022c84d032405975f0764ff59ac3035709a58f3368d480.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:520
    • C:\Users\Admin\AppData\Local\Temp\8b3b24070a3d3e064c022c84d032405975f0764ff59ac3035709a58f3368d480.exe
      tear
      2⤵
        PID:1108

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/520-54-0x0000000075351000-0x0000000075353000-memory.dmp

      Filesize

      8KB

    • memory/520-56-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1108-55-0x0000000000000000-mapping.dmp

    • memory/1108-58-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1108-59-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB