Analysis

  • max time kernel
    70s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 21:48

General

  • Target

    230b150e71d633abbb20680b707b05d3cd703147f0852ba23f5c410520d31207.exe

  • Size

    506KB

  • MD5

    69127cb9e21981818db0c2a93e5c3ee1

  • SHA1

    aa9718d8ab1739f777e5c9d8128d869ceb552d02

  • SHA256

    230b150e71d633abbb20680b707b05d3cd703147f0852ba23f5c410520d31207

  • SHA512

    fd64460062088437bde99374ab3470f31ab7c5c251f4d0552b82aa6dfcff91e27bceb4bec5a3b3afe767c6f9b4231cf8da8cccf6e3b6001c311213cb66842a2f

  • SSDEEP

    6144:rBckT3M8bt6A4Km3OXTj+0FhwZL8tobbvSr7LWXq3luMZ6MF2W/QxhR/WTEouyvV:uu8eHwOjj+sCHIyXhM6MjiHGV3

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\230b150e71d633abbb20680b707b05d3cd703147f0852ba23f5c410520d31207.exe
    "C:\Users\Admin\AppData\Local\Temp\230b150e71d633abbb20680b707b05d3cd703147f0852ba23f5c410520d31207.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\230b150e71d633abbb20680b707b05d3cd703147f0852ba23f5c410520d31207.exe
      start
      2⤵
        PID:2012
      • C:\Users\Admin\AppData\Local\Temp\230b150e71d633abbb20680b707b05d3cd703147f0852ba23f5c410520d31207.exe
        watch
        2⤵
          PID:1952

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1952-56-0x0000000000000000-mapping.dmp

      • memory/1952-61-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/1952-63-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/1992-54-0x0000000076121000-0x0000000076123000-memory.dmp

        Filesize

        8KB

      • memory/1992-59-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2012-55-0x0000000000000000-mapping.dmp

      • memory/2012-60-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2012-62-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB