Analysis

  • max time kernel
    47s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:11

General

  • Target

    5f957a00514df2ac49ea02c3e8f8264274e41fb2e83a39fdadf77d1746ae4d1f.exe

  • Size

    533KB

  • MD5

    943f34bd368be0ce2698d0e5d69ef8db

  • SHA1

    e2f9758fcf79616ed09857119e7bc867c6253c66

  • SHA256

    5f957a00514df2ac49ea02c3e8f8264274e41fb2e83a39fdadf77d1746ae4d1f

  • SHA512

    7375a67627b1dbcf56f6edf25df0b23482b8e38ccb10d68c1b501a8308398b5dd532cc2c8c0f05716fd38fc1edd73607fcfd14a0f22b29dda9961d4664e44eb7

  • SSDEEP

    12288:cSm8Ob6LNURdhhFE0TmMJXx0GLM5ChzQ1RVyk0jY:hmL6RIM0SWx0GLrh01jyb0

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f957a00514df2ac49ea02c3e8f8264274e41fb2e83a39fdadf77d1746ae4d1f.exe
    "C:\Users\Admin\AppData\Local\Temp\5f957a00514df2ac49ea02c3e8f8264274e41fb2e83a39fdadf77d1746ae4d1f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1532
    • C:\Users\Admin\AppData\Local\Temp\5f957a00514df2ac49ea02c3e8f8264274e41fb2e83a39fdadf77d1746ae4d1f.exe
      tear
      2⤵
        PID:1292

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1292-56-0x0000000000000000-mapping.dmp

    • memory/1292-59-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/1292-60-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/1532-54-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB

    • memory/1532-55-0x0000000075AE1000-0x0000000075AE3000-memory.dmp

      Filesize

      8KB

    • memory/1532-57-0x0000000000400000-0x0000000000491000-memory.dmp

      Filesize

      580KB