Analysis
-
max time kernel
26s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:41
Static task
static1
Behavioral task
behavioral1
Sample
8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe
Resource
win10v2004-20220812-en
General
-
Target
8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe
-
Size
522KB
-
MD5
dc158fa8b12b86d377dd91dfbf50fa4c
-
SHA1
cbcd9fcde52c34ccfec42ed0f7394afac5a347ce
-
SHA256
8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0
-
SHA512
8d29291ff6f7e4004ed133c727511608f9800ee29e51ffdfcd9986c3e22f36017c4d672f3e4ad105e4c9696fd10784ad2f4cddea979872d6c0e362ebc9f62f32
-
SSDEEP
6144:Q1aWZDxohQKwNk7rFmFY9jOX9MpC3UoaqpUxdrZPkTY/210YO9ALuEy+P4hrWZ2E:+aWEZr8WUtSC3FDpwtWsjYO9Atwh
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exedescription pid process target process PID 1212 wrote to memory of 1340 1212 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 1212 wrote to memory of 1340 1212 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 1212 wrote to memory of 1340 1212 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 1212 wrote to memory of 1340 1212 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 1212 wrote to memory of 1340 1212 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 1212 wrote to memory of 1340 1212 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 1212 wrote to memory of 1340 1212 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 1212 wrote to memory of 2044 1212 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 1212 wrote to memory of 2044 1212 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 1212 wrote to memory of 2044 1212 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 1212 wrote to memory of 2044 1212 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 1212 wrote to memory of 2044 1212 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 1212 wrote to memory of 2044 1212 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe PID 1212 wrote to memory of 2044 1212 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe 8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe"C:\Users\Admin\AppData\Local\Temp\8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exewatch2⤵
-
C:\Users\Admin\AppData\Local\Temp\8f63425f9753cbe9198ec68afc297f0176384ba66a551ee7371d780f66883ce0.exestart2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1212-54-0x0000000075E61000-0x0000000075E63000-memory.dmpFilesize
8KB
-
memory/1212-57-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1340-56-0x0000000000000000-mapping.dmp
-
memory/1340-59-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1340-63-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1340-64-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2044-55-0x0000000000000000-mapping.dmp
-
memory/2044-58-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2044-62-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2044-65-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB