Analysis

  • max time kernel
    39s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 07:43

General

  • Target

    6db1a5a97ff9fc5c68bb975b8b07c7ed7fa2e3c87f317a2111837a3089c4cde8.exe

  • Size

    526KB

  • MD5

    f2a705c1d4e2854cf307786559ce2aba

  • SHA1

    062df875349e13125f0144011d4a48a18679272d

  • SHA256

    6db1a5a97ff9fc5c68bb975b8b07c7ed7fa2e3c87f317a2111837a3089c4cde8

  • SHA512

    95214af9c5868e42cde37a6a55d39a36379113c63928dac5985d814429ef731c01af96dd85abc8649b63aee8f280832df735947a619f4e425ca6ec44d7eb3ac3

  • SSDEEP

    12288:5ZOMerF+tmPW5CL572hVTy18xQqpx8O5F6m:Gs2ZOatqpx8vm

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6db1a5a97ff9fc5c68bb975b8b07c7ed7fa2e3c87f317a2111837a3089c4cde8.exe
    "C:\Users\Admin\AppData\Local\Temp\6db1a5a97ff9fc5c68bb975b8b07c7ed7fa2e3c87f317a2111837a3089c4cde8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Users\Admin\AppData\Local\Temp\6db1a5a97ff9fc5c68bb975b8b07c7ed7fa2e3c87f317a2111837a3089c4cde8.exe
      start
      2⤵
        PID:1852
      • C:\Users\Admin\AppData\Local\Temp\6db1a5a97ff9fc5c68bb975b8b07c7ed7fa2e3c87f317a2111837a3089c4cde8.exe
        watch
        2⤵
          PID:1928

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/800-54-0x0000000075521000-0x0000000075523000-memory.dmp

        Filesize

        8KB

      • memory/800-57-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1852-55-0x0000000000000000-mapping.dmp

      • memory/1852-59-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1852-63-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1852-64-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1928-56-0x0000000000000000-mapping.dmp

      • memory/1928-58-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1928-61-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/1928-65-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB