Analysis

  • max time kernel
    30s
  • max time network
    112s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:30

General

  • Target

    a20115767fd8bef73ff5ac418ff9c29ce9cf5c7e04d9807b5f6d3c2aa603fad7.exe

  • Size

    521KB

  • MD5

    10bbc29b59a1630c46761e52501fa8a2

  • SHA1

    b1a0fd61c7ffef4c7444586a334f70507f6bf280

  • SHA256

    a20115767fd8bef73ff5ac418ff9c29ce9cf5c7e04d9807b5f6d3c2aa603fad7

  • SHA512

    b18318839f98a988b0d2410fc4c4d0934805e71565cbf1f116c408b6f61ba45aedf57c12ecbc95052e7f60d4d51c576254cec2fb2830e00da2e973977fc5c375

  • SSDEEP

    12288:1BBvxKtjo09LaaEPca6dHLGexGWRLUCZ:1fvxKt/9GaEPuL9GWS

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a20115767fd8bef73ff5ac418ff9c29ce9cf5c7e04d9807b5f6d3c2aa603fad7.exe
    "C:\Users\Admin\AppData\Local\Temp\a20115767fd8bef73ff5ac418ff9c29ce9cf5c7e04d9807b5f6d3c2aa603fad7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Users\Admin\AppData\Local\Temp\a20115767fd8bef73ff5ac418ff9c29ce9cf5c7e04d9807b5f6d3c2aa603fad7.exe
      start
      2⤵
        PID:1600
      • C:\Users\Admin\AppData\Local\Temp\a20115767fd8bef73ff5ac418ff9c29ce9cf5c7e04d9807b5f6d3c2aa603fad7.exe
        watch
        2⤵
          PID:1936

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1600-56-0x0000000000000000-mapping.dmp

      • memory/1600-61-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1600-62-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1668-54-0x0000000075931000-0x0000000075933000-memory.dmp

        Filesize

        8KB

      • memory/1668-57-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1936-55-0x0000000000000000-mapping.dmp

      • memory/1936-60-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1936-63-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB