Analysis

  • max time kernel
    36s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:48

General

  • Target

    84f3a2cf896f072662e266d2476bb2f57ff95d02bf6965b9bcee2db54937ef8a.exe

  • Size

    524KB

  • MD5

    29009e11e1263949a16859c9da6fe261

  • SHA1

    f9e70a329bd065f11c0b148a4c5c5fbf074c0b6c

  • SHA256

    84f3a2cf896f072662e266d2476bb2f57ff95d02bf6965b9bcee2db54937ef8a

  • SHA512

    227d5de0c9f106ebe7ead480cab63f5542e80cb9db8dcc976727aa444524ee7fe05df3c51f1a4c2f10a935ec24538ea2054c2abbb7a7cb0ca76dbd4c959cd1a6

  • SSDEEP

    12288:Z4k2FQ14B5r7UoUuUIaVzvBVKXCuapzDBG:Z4K14HflSIaVzvSXCXD

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84f3a2cf896f072662e266d2476bb2f57ff95d02bf6965b9bcee2db54937ef8a.exe
    "C:\Users\Admin\AppData\Local\Temp\84f3a2cf896f072662e266d2476bb2f57ff95d02bf6965b9bcee2db54937ef8a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\84f3a2cf896f072662e266d2476bb2f57ff95d02bf6965b9bcee2db54937ef8a.exe
      tear
      2⤵
        PID:1352

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1352-55-0x0000000000000000-mapping.dmp

    • memory/1352-58-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/1352-59-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/2040-54-0x00000000760B1000-0x00000000760B3000-memory.dmp

      Filesize

      8KB

    • memory/2040-56-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB