Analysis
-
max time kernel
38s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:37
Static task
static1
Behavioral task
behavioral1
Sample
94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe
Resource
win10v2004-20220812-en
General
-
Target
94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe
-
Size
518KB
-
MD5
58662ee4aaa4ffed137935b501a163dd
-
SHA1
7470aca9ca3024b4072b7bcf7689a520666d6d48
-
SHA256
94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e
-
SHA512
fe7735475394ef44a64fc3c68aef2606bcb031b70dff7b230381151643fd4b1e63afcc1b862cd9e3cb06b2a8d58a12b2655c97e8d1255590afbeacd1df2d9954
-
SSDEEP
12288:7t3M1IbZVJDRTqwwPUjASES/ya+WJPwTOEf/h7:pZDpqnPuAsz+OPwTvf/
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exedescription pid process target process PID 1160 wrote to memory of 1492 1160 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe PID 1160 wrote to memory of 1492 1160 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe PID 1160 wrote to memory of 1492 1160 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe PID 1160 wrote to memory of 1492 1160 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe PID 1160 wrote to memory of 1492 1160 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe PID 1160 wrote to memory of 1492 1160 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe PID 1160 wrote to memory of 1492 1160 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe PID 1160 wrote to memory of 1456 1160 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe PID 1160 wrote to memory of 1456 1160 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe PID 1160 wrote to memory of 1456 1160 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe PID 1160 wrote to memory of 1456 1160 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe PID 1160 wrote to memory of 1456 1160 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe PID 1160 wrote to memory of 1456 1160 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe PID 1160 wrote to memory of 1456 1160 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe 94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe"C:\Users\Admin\AppData\Local\Temp\94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\94851a1a0b005ca6ceb7281600af5edc7af186c7725bbdc5976ea19ef3b3c46e.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1160-54-0x0000000075B11000-0x0000000075B13000-memory.dmpFilesize
8KB
-
memory/1160-59-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1456-55-0x0000000000000000-mapping.dmp
-
memory/1456-61-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1456-63-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1492-56-0x0000000000000000-mapping.dmp
-
memory/1492-60-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1492-62-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB