Analysis

  • max time kernel
    36s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:18

General

  • Target

    5478eac2c659aca9889073f9031d07cb8649314d28cd8e64a845ca28ae72100c.exe

  • Size

    524KB

  • MD5

    32785253f39cb197896f7a41b3a20d9f

  • SHA1

    88f7b6fcd3b6f0133263a1f761994f530604c3e1

  • SHA256

    5478eac2c659aca9889073f9031d07cb8649314d28cd8e64a845ca28ae72100c

  • SHA512

    4cfca3f3326887d4c1a7b1f3a12d77926f2b48f94e5341356c302c7c86cc01ee82cff33854e62620b3fc07b2fe4f703473247f32e91c6a49adae847da0ee634c

  • SSDEEP

    12288:W3TD/1x2hqkdBivmf6LpCVzvBVKXCuapzDBG:KTMbBqmf6dCVzvSXCXD

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5478eac2c659aca9889073f9031d07cb8649314d28cd8e64a845ca28ae72100c.exe
    "C:\Users\Admin\AppData\Local\Temp\5478eac2c659aca9889073f9031d07cb8649314d28cd8e64a845ca28ae72100c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Local\Temp\5478eac2c659aca9889073f9031d07cb8649314d28cd8e64a845ca28ae72100c.exe
      tear
      2⤵
        PID:1048

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1048-56-0x0000000000000000-mapping.dmp

    • memory/1048-59-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/1048-60-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/1256-54-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/1256-55-0x0000000075C61000-0x0000000075C63000-memory.dmp

      Filesize

      8KB

    • memory/1256-57-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB