Analysis

  • max time kernel
    45s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 07:34

General

  • Target

    ea3a33db7b7d70c8b3541a824d72c91eae18bea421839234eeb3c5829783ed05.exe

  • Size

    518KB

  • MD5

    30c462151852897a07ebf91d087f0991

  • SHA1

    e801175e54c41fa165ab9a7c515c8c8886146c80

  • SHA256

    ea3a33db7b7d70c8b3541a824d72c91eae18bea421839234eeb3c5829783ed05

  • SHA512

    e69120ebbe68768c3b8ad000cb49e63bf88d36c0a35b4fef8819643be4a342e9a13efe2107b681a9b8f1ddc8405a2c6410a09254f0fbf1e017d4a91590d764de

  • SSDEEP

    12288:W+U9LE2Or8Ck/9bh6Q4/wYYlLPt5oKnWq39b8:kLnOKh6Q40lLPt5/Wo8

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea3a33db7b7d70c8b3541a824d72c91eae18bea421839234eeb3c5829783ed05.exe
    "C:\Users\Admin\AppData\Local\Temp\ea3a33db7b7d70c8b3541a824d72c91eae18bea421839234eeb3c5829783ed05.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Users\Admin\AppData\Local\Temp\ea3a33db7b7d70c8b3541a824d72c91eae18bea421839234eeb3c5829783ed05.exe
      start
      2⤵
        PID:1696
      • C:\Users\Admin\AppData\Local\Temp\ea3a33db7b7d70c8b3541a824d72c91eae18bea421839234eeb3c5829783ed05.exe
        watch
        2⤵
          PID:1704

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1464-54-0x0000000075B51000-0x0000000075B53000-memory.dmp

        Filesize

        8KB

      • memory/1464-57-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1696-61-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1696-62-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1704-60-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB

      • memory/1704-63-0x0000000000400000-0x000000000048B000-memory.dmp

        Filesize

        556KB