Analysis
-
max time kernel
41s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 07:49
Static task
static1
Behavioral task
behavioral1
Sample
30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe
Resource
win10v2004-20221111-en
General
-
Target
30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe
-
Size
526KB
-
MD5
ea917cbcf88a3e19eee7cc7bc8ccf11e
-
SHA1
daf3712a56bddbdc41b6aeb48d6454e693992a25
-
SHA256
30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc
-
SHA512
2d1d7217dd32479b6d29c3496a98d62c50fbf5a6ee99646c7ffaccb32ad320ec0e0bcbc69984143ebc1e010762c85e4b4cd1b4c1168ef38a8c9ce04c875f11b1
-
SSDEEP
12288:FsXTd4Ir/wk9WeDKKDKS+2My18xQqpx8O5Cj:eyIbwKW2LDKoMatqpx8d
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exedescription pid process target process PID 2032 wrote to memory of 1120 2032 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 2032 wrote to memory of 1120 2032 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 2032 wrote to memory of 1120 2032 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 2032 wrote to memory of 1120 2032 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 2032 wrote to memory of 1120 2032 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 2032 wrote to memory of 1120 2032 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 2032 wrote to memory of 1120 2032 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 2032 wrote to memory of 844 2032 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 2032 wrote to memory of 844 2032 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 2032 wrote to memory of 844 2032 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 2032 wrote to memory of 844 2032 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 2032 wrote to memory of 844 2032 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 2032 wrote to memory of 844 2032 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe PID 2032 wrote to memory of 844 2032 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe 30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe"C:\Users\Admin\AppData\Local\Temp\30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\30728143ed62c7122ef5154030cb67ae64f027aff50f4f8e561f46cb6e001ffc.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/844-62-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/844-69-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/844-56-0x0000000000000000-mapping.dmp
-
memory/844-66-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/844-58-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/844-64-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1120-65-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1120-63-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1120-59-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1120-67-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1120-68-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/1120-55-0x0000000000000000-mapping.dmp
-
memory/2032-54-0x0000000076B51000-0x0000000076B53000-memory.dmpFilesize
8KB
-
memory/2032-57-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB