Analysis

  • max time kernel
    247s
  • max time network
    337s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:53

General

  • Target

    7cbf0ec43484b478aa648fe7dcc33b6c5458e206e50d504ba807893011470d48.exe

  • Size

    522KB

  • MD5

    d830c72d937455710e24524fcc5eecc8

  • SHA1

    a23a43900cb079dc4c12bff064da72e34386fd82

  • SHA256

    7cbf0ec43484b478aa648fe7dcc33b6c5458e206e50d504ba807893011470d48

  • SHA512

    0a5c775b26fed0be98c69357ea7acf5299c670c42a2c70f3d77b4e2157c9158b172c94955b8831cdef09518641c5348fee9e10b7b6c59a091f53b041deefaa55

  • SSDEEP

    6144:87J/qhOX/eG4zyJ6soak9Zv6aZXwZYo3mQy1CrxQqD9RSaSz+8O52hdPe:cNTX2w4gC8qXwD9y18xQqpx8O52

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7cbf0ec43484b478aa648fe7dcc33b6c5458e206e50d504ba807893011470d48.exe
    "C:\Users\Admin\AppData\Local\Temp\7cbf0ec43484b478aa648fe7dcc33b6c5458e206e50d504ba807893011470d48.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:468
    • C:\Users\Admin\AppData\Local\Temp\7cbf0ec43484b478aa648fe7dcc33b6c5458e206e50d504ba807893011470d48.exe
      start
      2⤵
        PID:1104
      • C:\Users\Admin\AppData\Local\Temp\7cbf0ec43484b478aa648fe7dcc33b6c5458e206e50d504ba807893011470d48.exe
        watch
        2⤵
          PID:1172

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/468-54-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/468-55-0x0000000075E81000-0x0000000075E83000-memory.dmp

        Filesize

        8KB

      • memory/468-58-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1104-57-0x0000000000000000-mapping.dmp

      • memory/1104-59-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1104-63-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1104-65-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1172-56-0x0000000000000000-mapping.dmp

      • memory/1172-60-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1172-64-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1172-66-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB