Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 06:58
Static task
static1
Behavioral task
behavioral1
Sample
d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe
Resource
win10v2004-20220812-en
General
-
Target
d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe
-
Size
533KB
-
MD5
7775ab2a53475d3ba9fc501fb43051b4
-
SHA1
da7da07a6db4119fb65cdf118ac3b7863b278e9e
-
SHA256
d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9
-
SHA512
97985c65e63fcbd11aa9b7af64c7a810c50856cafc564ef862b3846575af49ed11243e76fd77275766af642c64fd91b1f8e3a99b5771148ec130391f851389ae
-
SSDEEP
12288:8mio3M1gol1p/IaMpyCqi8ka8nmCEJdTye63QmeRu:L3Mt19lMpXqi8kJcDmeRu
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exedescription pid process target process PID 1972 wrote to memory of 1904 1972 d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe PID 1972 wrote to memory of 1904 1972 d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe PID 1972 wrote to memory of 1904 1972 d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe PID 1972 wrote to memory of 1904 1972 d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe PID 1972 wrote to memory of 2044 1972 d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe PID 1972 wrote to memory of 2044 1972 d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe PID 1972 wrote to memory of 2044 1972 d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe PID 1972 wrote to memory of 2044 1972 d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe"C:\Users\Admin\AppData\Local\Temp\d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exestart2⤵
-
C:\Users\Admin\AppData\Local\Temp\d7bba79e147770ce35cff631342782b299cbca20da07b17bdb1e024f56fe34f9.exewatch2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1904-56-0x0000000000000000-mapping.dmp
-
memory/1904-62-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/1904-63-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/1972-54-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/1972-55-0x0000000075501000-0x0000000075503000-memory.dmpFilesize
8KB
-
memory/1972-59-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/2044-57-0x0000000000000000-mapping.dmp
-
memory/2044-61-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/2044-64-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB