Analysis
-
max time kernel
247s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:34
Static task
static1
Behavioral task
behavioral1
Sample
392933803901710f2f12e72888d8a84fa4d193ce82f3ad5df39687d3df6f9e2d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
392933803901710f2f12e72888d8a84fa4d193ce82f3ad5df39687d3df6f9e2d.exe
Resource
win10v2004-20221111-en
General
-
Target
392933803901710f2f12e72888d8a84fa4d193ce82f3ad5df39687d3df6f9e2d.exe
-
Size
524KB
-
MD5
715eccf7ecd063392f00dff6792c667a
-
SHA1
30aab90e6be6d208a4ea5ea58b4cae94144435a5
-
SHA256
392933803901710f2f12e72888d8a84fa4d193ce82f3ad5df39687d3df6f9e2d
-
SHA512
621ddf78b7f0f194bd97ffe6a9f0dd3634a61d466e5100536e2443bd2327d8067072c13535419cc459a22f52d22c88904fe435c8f41ddc667dc92402a30a93c0
-
SSDEEP
12288:6IaqmIY8Rais3JT897VzvBVKXCuapzDBG:FaqnlwO97VzvSXCXD
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
392933803901710f2f12e72888d8a84fa4d193ce82f3ad5df39687d3df6f9e2d.exedescription pid process target process PID 560 wrote to memory of 1916 560 392933803901710f2f12e72888d8a84fa4d193ce82f3ad5df39687d3df6f9e2d.exe 392933803901710f2f12e72888d8a84fa4d193ce82f3ad5df39687d3df6f9e2d.exe PID 560 wrote to memory of 1916 560 392933803901710f2f12e72888d8a84fa4d193ce82f3ad5df39687d3df6f9e2d.exe 392933803901710f2f12e72888d8a84fa4d193ce82f3ad5df39687d3df6f9e2d.exe PID 560 wrote to memory of 1916 560 392933803901710f2f12e72888d8a84fa4d193ce82f3ad5df39687d3df6f9e2d.exe 392933803901710f2f12e72888d8a84fa4d193ce82f3ad5df39687d3df6f9e2d.exe PID 560 wrote to memory of 1916 560 392933803901710f2f12e72888d8a84fa4d193ce82f3ad5df39687d3df6f9e2d.exe 392933803901710f2f12e72888d8a84fa4d193ce82f3ad5df39687d3df6f9e2d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\392933803901710f2f12e72888d8a84fa4d193ce82f3ad5df39687d3df6f9e2d.exe"C:\Users\Admin\AppData\Local\Temp\392933803901710f2f12e72888d8a84fa4d193ce82f3ad5df39687d3df6f9e2d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\392933803901710f2f12e72888d8a84fa4d193ce82f3ad5df39687d3df6f9e2d.exetear2⤵PID:1916
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/560-54-0x0000000075551000-0x0000000075553000-memory.dmpFilesize
8KB
-
memory/560-56-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1916-55-0x0000000000000000-mapping.dmp
-
memory/1916-58-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1916-59-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1916-60-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB