Analysis

  • max time kernel
    237s
  • max time network
    337s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 07:42

General

  • Target

    87ccab66bf35db39077055539cd134e2708baa7bb1f90c566ed53b685512a00a.exe

  • Size

    522KB

  • MD5

    012bbf88009e1ae190c6b1cddbbd00f3

  • SHA1

    389a2fac99a276aeb8c69967f79ca3a7b63c5c4f

  • SHA256

    87ccab66bf35db39077055539cd134e2708baa7bb1f90c566ed53b685512a00a

  • SHA512

    b7a8b7fae4cb8cf7b3502432b9e5bdba2be3edca38d73e8a85aca3052ba42a370261b52131821a63deee469eb6ffdbf77f2e5cd772aa3b534f064bf1d254db1d

  • SSDEEP

    12288:FmI/dtlrV+rorL3WmSn4ty18xQqpx8O5X:J7UcL3Yn4tatqpx8

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87ccab66bf35db39077055539cd134e2708baa7bb1f90c566ed53b685512a00a.exe
    "C:\Users\Admin\AppData\Local\Temp\87ccab66bf35db39077055539cd134e2708baa7bb1f90c566ed53b685512a00a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\87ccab66bf35db39077055539cd134e2708baa7bb1f90c566ed53b685512a00a.exe
      start
      2⤵
        PID:576
      • C:\Users\Admin\AppData\Local\Temp\87ccab66bf35db39077055539cd134e2708baa7bb1f90c566ed53b685512a00a.exe
        watch
        2⤵
          PID:588

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/576-57-0x0000000000000000-mapping.dmp

      • memory/576-59-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/576-64-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/576-65-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/576-66-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/588-56-0x0000000000000000-mapping.dmp

      • memory/588-60-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/588-63-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/588-67-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1192-54-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1192-55-0x00000000761F1000-0x00000000761F3000-memory.dmp

        Filesize

        8KB

      • memory/1192-58-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB