Analysis

  • max time kernel
    8s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:31

General

  • Target

    a09bbea1fcfa191037f14c95871bd8fe5f4904d55add0f76a7810c2b2b49b41e.exe

  • Size

    532KB

  • MD5

    3570ea449c1734c2e854b43b1ae6b1fc

  • SHA1

    6270fbe0b4e41c416470af738187ec223c6dd4c0

  • SHA256

    a09bbea1fcfa191037f14c95871bd8fe5f4904d55add0f76a7810c2b2b49b41e

  • SHA512

    2cfa3892ccb8067a3e05e7befe66c6ac2e9b7aa393c7630afbad893614ec95c47c79dc4bb70109c9ef6f2b6f7ea0e35fe901bac2c7016bfe7ab282edf5000263

  • SSDEEP

    12288:qRu53HJWVzKBVSYDFIPh2RIbWcoIFFEgB9nP1vA:qROHJWUTScFIp0IbWcoIFagbPNA

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a09bbea1fcfa191037f14c95871bd8fe5f4904d55add0f76a7810c2b2b49b41e.exe
    "C:\Users\Admin\AppData\Local\Temp\a09bbea1fcfa191037f14c95871bd8fe5f4904d55add0f76a7810c2b2b49b41e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\a09bbea1fcfa191037f14c95871bd8fe5f4904d55add0f76a7810c2b2b49b41e.exe
      tear
      2⤵
        PID:864

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/864-55-0x0000000000000000-mapping.dmp

    • memory/864-58-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/864-59-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/2044-54-0x00000000767F1000-0x00000000767F3000-memory.dmp

      Filesize

      8KB

    • memory/2044-56-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB