Analysis

  • max time kernel
    35s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 17:20

General

  • Target

    470c4b744597f2aaa66c5c00253e51532ec56ae404fe0953dfdce4b1b3f1213e.exe

  • Size

    522KB

  • MD5

    3d93261c068203bfee62a82d80779c3e

  • SHA1

    52ebda749c883c9a9977539b61b4a55f40be9e74

  • SHA256

    470c4b744597f2aaa66c5c00253e51532ec56ae404fe0953dfdce4b1b3f1213e

  • SHA512

    eea19dbe665ba645252ea64211d4fde93d6afa3d4d1932e7594d9fe7aa16a1c2966d2d097f2d5c56d31c5e6daabac57de098ac366c6498d8c770e7948a92ff6d

  • SSDEEP

    6144:XdjaQ4LdKyUl58ivpP/1EhqfPApStQo0+zLW4UFWcZQmQy1CrxQqD9RSaSz+8O5R:YEyq58izLKs0WVy18xQqpx8O5Dg

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\470c4b744597f2aaa66c5c00253e51532ec56ae404fe0953dfdce4b1b3f1213e.exe
    "C:\Users\Admin\AppData\Local\Temp\470c4b744597f2aaa66c5c00253e51532ec56ae404fe0953dfdce4b1b3f1213e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Users\Admin\AppData\Local\Temp\470c4b744597f2aaa66c5c00253e51532ec56ae404fe0953dfdce4b1b3f1213e.exe
      start
      2⤵
        PID:1428
      • C:\Users\Admin\AppData\Local\Temp\470c4b744597f2aaa66c5c00253e51532ec56ae404fe0953dfdce4b1b3f1213e.exe
        watch
        2⤵
          PID:2012

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/784-54-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/784-55-0x0000000075FC1000-0x0000000075FC3000-memory.dmp
        Filesize

        8KB

      • memory/784-58-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1428-57-0x0000000000000000-mapping.dmp
      • memory/1428-60-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1428-64-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/1428-65-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/2012-56-0x0000000000000000-mapping.dmp
      • memory/2012-59-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/2012-63-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB

      • memory/2012-66-0x0000000000400000-0x000000000048C000-memory.dmp
        Filesize

        560KB