Analysis

  • max time kernel
    47s
  • max time network
    74s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 23:50

General

  • Target

    3f8668faa3b6e008c6d78bd94e37145aef66366fdb5a5fecb6485c2433b8f121.exe

  • Size

    75KB

  • MD5

    8c583147692abb739f4ab3c526775934

  • SHA1

    a619dd738fdcb322f030fedb06de269c263a7988

  • SHA256

    3f8668faa3b6e008c6d78bd94e37145aef66366fdb5a5fecb6485c2433b8f121

  • SHA512

    cc269ce1a07340bd16308564d84ac6742d8ddf663acae326b0ad9ded6ec80638c52413a6184c198f54cff15d588928da015c6322da1a43a87a77fbc8a25ba7fa

  • SSDEEP

    1536:Dj8d0QHjiifOBqvUlEhHJ8t4yhOUvwrOSUN9PXKQJBV3L+lfDTw:Dj8d0iiifO+hHJ8JhOUvwrhUN9Pa4Bkw

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f8668faa3b6e008c6d78bd94e37145aef66366fdb5a5fecb6485c2433b8f121.exe
    "C:\Users\Admin\AppData\Local\Temp\3f8668faa3b6e008c6d78bd94e37145aef66366fdb5a5fecb6485c2433b8f121.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1352
    • C:\Users\Admin\AppData\Local\Temp\3f8668faa3b6e008c6d78bd94e37145aef66366fdb5a5fecb6485c2433b8f121.exe
      ?
      2⤵
        PID:1284

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1284-55-0x0000000075F51000-0x0000000075F53000-memory.dmp

      Filesize

      8KB

    • memory/1284-56-0x0000000010000000-0x000000001000C000-memory.dmp

      Filesize

      48KB