Analysis

  • max time kernel
    34s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:50

General

  • Target

    1d2dcec8ffb08f6db0f4cdfe34f1ee9eb1a93fdb4952860d7ef9544adc37bb19.exe

  • Size

    532KB

  • MD5

    76cad408dc92e0d6a40f3bcdd51d2072

  • SHA1

    d5b4b96df447b4efa4f9ec3bc866759306f46e1d

  • SHA256

    1d2dcec8ffb08f6db0f4cdfe34f1ee9eb1a93fdb4952860d7ef9544adc37bb19

  • SHA512

    a4ce8e5ffd36126eaeca6399db2e11e9c7c2aaa94a5224b91b6c34b527aa81bdec60d84ceff1afd9802c2b753be842a5e5d11ef84b974b2f442b48435854bce5

  • SSDEEP

    12288:P3wkb8wu1DKhAcb4/xht1slKWNkBoPh2RIbWcoIFFEgB9nP1K:Pp8wuJRX5mfqBop0IbWcoIFagbPo

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d2dcec8ffb08f6db0f4cdfe34f1ee9eb1a93fdb4952860d7ef9544adc37bb19.exe
    "C:\Users\Admin\AppData\Local\Temp\1d2dcec8ffb08f6db0f4cdfe34f1ee9eb1a93fdb4952860d7ef9544adc37bb19.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Users\Admin\AppData\Local\Temp\1d2dcec8ffb08f6db0f4cdfe34f1ee9eb1a93fdb4952860d7ef9544adc37bb19.exe
      tear
      2⤵
        PID:1892

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1608-54-0x0000000075A91000-0x0000000075A93000-memory.dmp

      Filesize

      8KB

    • memory/1608-57-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/1892-55-0x0000000000000000-mapping.dmp

    • memory/1892-58-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/1892-59-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB