Analysis

  • max time kernel
    42s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:44

General

  • Target

    2803ff18a6fb0890da19024c904384434ae8627c96e423017ff8b994ad59aed5.exe

  • Size

    522KB

  • MD5

    7109fbbddb2789f706881b5848806871

  • SHA1

    f41f60934fbb53cc06d686c08e58208c9e3cc71b

  • SHA256

    2803ff18a6fb0890da19024c904384434ae8627c96e423017ff8b994ad59aed5

  • SHA512

    3cdb9da3209afdc5cc1cb38fc9d21a8938b52f2099c825a334b7f82075feed14dbf9f7f0fe5e609aa5675672328c3dc7e72d3367f3f270c30b3b97e32d027fd4

  • SSDEEP

    12288:VAkcWwB1/T9DExS1Czxo4xUupSMrFCsNEfF4Sk:3wB1bGxxG4quouFCsNaHk

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2803ff18a6fb0890da19024c904384434ae8627c96e423017ff8b994ad59aed5.exe
    "C:\Users\Admin\AppData\Local\Temp\2803ff18a6fb0890da19024c904384434ae8627c96e423017ff8b994ad59aed5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\AppData\Local\Temp\2803ff18a6fb0890da19024c904384434ae8627c96e423017ff8b994ad59aed5.exe
      start
      2⤵
        PID:1576
      • C:\Users\Admin\AppData\Local\Temp\2803ff18a6fb0890da19024c904384434ae8627c96e423017ff8b994ad59aed5.exe
        watch
        2⤵
          PID:1540

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1540-55-0x0000000000000000-mapping.dmp

      • memory/1540-60-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1540-63-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1576-56-0x0000000000000000-mapping.dmp

      • memory/1576-61-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1576-62-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1752-54-0x0000000075111000-0x0000000075113000-memory.dmp

        Filesize

        8KB

      • memory/1752-57-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB