Analysis

  • max time kernel
    45s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:49

General

  • Target

    830dc7a88871db6c5c03f28785c24d55141e2ce4f81df3d9467b3399f21a0a97.exe

  • Size

    526KB

  • MD5

    959f7df6ac619d75c0706d2aed11caa7

  • SHA1

    676cae4169d2135ae09723684ddaeb8152c6bafd

  • SHA256

    830dc7a88871db6c5c03f28785c24d55141e2ce4f81df3d9467b3399f21a0a97

  • SHA512

    d58e14b99ee0ad0cf88aa3b01a12bb889ca3aa7930e773f32c8a7512697224a2433314e71130b37022cef5316684991aaa46d72ae7c4dce7b289a40943aa5082

  • SSDEEP

    6144:PrC7OEMAF2Wdg6MHcz8xaoZ65cFFNAdq6TsKjWpkx0K+DKIFdGx3DQC48HUJcS4f:x6BSS0XdstjW40KgozQ0Ue8u08

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\830dc7a88871db6c5c03f28785c24d55141e2ce4f81df3d9467b3399f21a0a97.exe
    "C:\Users\Admin\AppData\Local\Temp\830dc7a88871db6c5c03f28785c24d55141e2ce4f81df3d9467b3399f21a0a97.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Users\Admin\AppData\Local\Temp\830dc7a88871db6c5c03f28785c24d55141e2ce4f81df3d9467b3399f21a0a97.exe
      tear
      2⤵
        PID:1232

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/852-56-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/852-54-0x0000000074E41000-0x0000000074E43000-memory.dmp

      Filesize

      8KB

    • memory/1232-55-0x0000000000000000-mapping.dmp

    • memory/1232-58-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1232-59-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB