Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 19:09

General

  • Target

    72fab28ebe1592e00f6edd632c172383ee60a6e650d179ccd00304078ae8bd61.exe

  • Size

    472KB

  • MD5

    b4b8733654e23590aeea2d7a5d327190

  • SHA1

    97fe92f4b03f8c7bc436317d3e459bb8b96403e9

  • SHA256

    72fab28ebe1592e00f6edd632c172383ee60a6e650d179ccd00304078ae8bd61

  • SHA512

    7971197df664735c25e3aa15b5c7190b931b82968ff63f1c58ac786872863243d3de0687e7b1a3aaca34640ba4af107b319e860aae0d059ea92e181ce5a602f1

  • SSDEEP

    6144:vOVxgn0ZiwYhwU7//cvXdtbGZaklF5aEny0GH9ClBVKy3PH4CNb4PCN39d4W+Rt1:vOvy0VNvnsaiF5CHW3v4g46ND4WGUgb

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72fab28ebe1592e00f6edd632c172383ee60a6e650d179ccd00304078ae8bd61.exe
    "C:\Users\Admin\AppData\Local\Temp\72fab28ebe1592e00f6edd632c172383ee60a6e650d179ccd00304078ae8bd61.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Users\Admin\AppData\Local\Temp\72fab28ebe1592e00f6edd632c172383ee60a6e650d179ccd00304078ae8bd61.exe
      start
      2⤵
        PID:780
      • C:\Users\Admin\AppData\Local\Temp\72fab28ebe1592e00f6edd632c172383ee60a6e650d179ccd00304078ae8bd61.exe
        watch
        2⤵
          PID:1648

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/780-55-0x0000000000000000-mapping.dmp

      • memory/780-60-0x0000000000400000-0x000000000047B000-memory.dmp

        Filesize

        492KB

      • memory/780-62-0x0000000000400000-0x000000000047B000-memory.dmp

        Filesize

        492KB

      • memory/1492-54-0x0000000076121000-0x0000000076123000-memory.dmp

        Filesize

        8KB

      • memory/1492-57-0x0000000000400000-0x000000000047B000-memory.dmp

        Filesize

        492KB

      • memory/1648-56-0x0000000000000000-mapping.dmp

      • memory/1648-61-0x0000000000400000-0x000000000047B000-memory.dmp

        Filesize

        492KB

      • memory/1648-63-0x0000000000400000-0x000000000047B000-memory.dmp

        Filesize

        492KB