Analysis

  • max time kernel
    37s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:27

General

  • Target

    a947a6aa7dc3e5284d67d892bb776ec906f9d07fcb145883a8d834061d5dad22.exe

  • Size

    524KB

  • MD5

    b8b072045223d1c59c720251df3db6ef

  • SHA1

    1fc568ebdaf03c27f40f14df31ac0ac97aa4777c

  • SHA256

    a947a6aa7dc3e5284d67d892bb776ec906f9d07fcb145883a8d834061d5dad22

  • SHA512

    4939bdc4ddef764db42ac0217e6733b4fb8db2bdceca9f516cf691947f0a81b29196944f070c998bc8e23db9b3236a0f796133e96e3cf7cef86b30f5b43b588e

  • SSDEEP

    12288:DRfuESyUi/SSmwBXnAVzvBVKXCuapzDBG:VfYBiXmkXAVzvSXCXD

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a947a6aa7dc3e5284d67d892bb776ec906f9d07fcb145883a8d834061d5dad22.exe
    "C:\Users\Admin\AppData\Local\Temp\a947a6aa7dc3e5284d67d892bb776ec906f9d07fcb145883a8d834061d5dad22.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\a947a6aa7dc3e5284d67d892bb776ec906f9d07fcb145883a8d834061d5dad22.exe
      tear
      2⤵
        PID:1580

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1580-55-0x0000000000000000-mapping.dmp

    • memory/1580-57-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/1580-59-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/1580-60-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/1672-54-0x0000000075BD1000-0x0000000075BD3000-memory.dmp

      Filesize

      8KB

    • memory/1672-56-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB