Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:37

General

  • Target

    34b43de1bfe0bbce5bb6bc219b0bdd7848befa58451086c9e1d268d219b55e26.exe

  • Size

    522KB

  • MD5

    7e40bf261542bf056f3c1b005d647fe4

  • SHA1

    32bb56745ad7d561dc8a2838af364127c862da89

  • SHA256

    34b43de1bfe0bbce5bb6bc219b0bdd7848befa58451086c9e1d268d219b55e26

  • SHA512

    c818ea3e351e040be3f07148157c67f251d2b8fb5e0c7a10585220a5d16f72a65260f5c764e387b2ee198bef215beab1414b187f63f3df35caeb561b1bf4d8aa

  • SSDEEP

    12288:bUhN/7wWTmONgwyi59CDpwtWsjYO9AtwN0s:Qvdpyi5ICrkO9qwp

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34b43de1bfe0bbce5bb6bc219b0bdd7848befa58451086c9e1d268d219b55e26.exe
    "C:\Users\Admin\AppData\Local\Temp\34b43de1bfe0bbce5bb6bc219b0bdd7848befa58451086c9e1d268d219b55e26.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Users\Admin\AppData\Local\Temp\34b43de1bfe0bbce5bb6bc219b0bdd7848befa58451086c9e1d268d219b55e26.exe
      start
      2⤵
        PID:1692
      • C:\Users\Admin\AppData\Local\Temp\34b43de1bfe0bbce5bb6bc219b0bdd7848befa58451086c9e1d268d219b55e26.exe
        watch
        2⤵
          PID:1072

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/740-54-0x0000000075A81000-0x0000000075A83000-memory.dmp

        Filesize

        8KB

      • memory/740-57-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1072-55-0x0000000000000000-mapping.dmp

      • memory/1072-59-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1072-62-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1072-66-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1692-56-0x0000000000000000-mapping.dmp

      • memory/1692-58-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1692-63-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1692-64-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1692-65-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB