Analysis

  • max time kernel
    42s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:39

General

  • Target

    9188942efcc237f820bec885f6968d9e67c9b587adb98434642120ad3781869f.exe

  • Size

    522KB

  • MD5

    67b0324bc55f6335220fe6875b6b2da2

  • SHA1

    c09823f4dc47852468fcff79fae261ebc1440566

  • SHA256

    9188942efcc237f820bec885f6968d9e67c9b587adb98434642120ad3781869f

  • SHA512

    6aa7410fd1ba2da5f8d39ab707d67623dea98eacc2721428fd3b7a2667fd444fba64e2b2c4fc27d5831db8695e731a0ffcb38eccc2bb0b8ec093612da6b560ad

  • SSDEEP

    6144:wPKIQO3laz9MEhewHZ0tCXSzfesIL6TLBa3FUWc5aqpUxdrZPkTY/210YO9ALuEL:Uk2wHvJYNj5DpwtWsjYO9AtwN

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9188942efcc237f820bec885f6968d9e67c9b587adb98434642120ad3781869f.exe
    "C:\Users\Admin\AppData\Local\Temp\9188942efcc237f820bec885f6968d9e67c9b587adb98434642120ad3781869f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:108
    • C:\Users\Admin\AppData\Local\Temp\9188942efcc237f820bec885f6968d9e67c9b587adb98434642120ad3781869f.exe
      start
      2⤵
        PID:1940
      • C:\Users\Admin\AppData\Local\Temp\9188942efcc237f820bec885f6968d9e67c9b587adb98434642120ad3781869f.exe
        watch
        2⤵
          PID:808

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/108-54-0x0000000075B41000-0x0000000075B43000-memory.dmp

        Filesize

        8KB

      • memory/108-57-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/808-55-0x0000000000000000-mapping.dmp

      • memory/808-59-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/808-63-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/808-65-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1940-56-0x0000000000000000-mapping.dmp

      • memory/1940-58-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1940-62-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1940-64-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB