Analysis

  • max time kernel
    250s
  • max time network
    336s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:26

General

  • Target

    479d4bc4a5bac7532dc12f18caa909606007931b627cbadedbc258395708a996.exe

  • Size

    521KB

  • MD5

    409a66243e9ec22187de9d98082e5d19

  • SHA1

    ed418d99bb49ec0b1753fad637f54c50827dff95

  • SHA256

    479d4bc4a5bac7532dc12f18caa909606007931b627cbadedbc258395708a996

  • SHA512

    3b7401af8827991da7065f68a353211a13abb261b577acd50edd7592ce38f2c216dd5a43e21291bc9f49520d34478c9cfb7e9d311a8c08b5b749732cbf266a9c

  • SSDEEP

    12288:QzdfMB1uYAcRfcyDFTRZU87Q7bGexGWRLUFc:QzqiY++FTRZU8ub9GWS

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\479d4bc4a5bac7532dc12f18caa909606007931b627cbadedbc258395708a996.exe
    "C:\Users\Admin\AppData\Local\Temp\479d4bc4a5bac7532dc12f18caa909606007931b627cbadedbc258395708a996.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:772
    • C:\Users\Admin\AppData\Local\Temp\479d4bc4a5bac7532dc12f18caa909606007931b627cbadedbc258395708a996.exe
      start
      2⤵
        PID:1392
      • C:\Users\Admin\AppData\Local\Temp\479d4bc4a5bac7532dc12f18caa909606007931b627cbadedbc258395708a996.exe
        watch
        2⤵
          PID:468

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/468-56-0x0000000000000000-mapping.dmp

      • memory/468-62-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/468-65-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/772-54-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/772-55-0x00000000761F1000-0x00000000761F3000-memory.dmp

        Filesize

        8KB

      • memory/772-58-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1392-57-0x0000000000000000-mapping.dmp

      • memory/1392-61-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1392-63-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1392-64-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB