Analysis

  • max time kernel
    44s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2022, 21:39

General

  • Target

    2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exe

  • Size

    487KB

  • MD5

    01ba33a286c7dd6dd77850215da5d496

  • SHA1

    90b9a46052e4ebb000ee159cbeb76c99efb87187

  • SHA256

    2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b

  • SHA512

    2e42f31dd40c6f05d9f3e1478e3903162d0e05e92ab0b23d303b9bef02aea4a0b9315b0a7cb916d9f7e275e554e8f587868b4d444107f787cdf9c2dc413693a4

  • SSDEEP

    6144:x9hFBVwCRMnHeym4EG9o1Le199srRE1rAz83c+R4vtio4M99Dv3iQAgUPuy9mnve:4Cqnr6E9/FjLqAoj99byQAgPyE

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exe
    "C:\Users\Admin\AppData\Local\Temp\2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Users\Admin\AppData\Local\Temp\2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exe
      start
      2⤵
        PID:1648
      • C:\Users\Admin\AppData\Local\Temp\2ef83b5db15981bff6167f2b18cc2df22cd0597b527b8e5d4a59c1985021427b.exe
        watch
        2⤵
          PID:956

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/912-54-0x0000000076091000-0x0000000076093000-memory.dmp

        Filesize

        8KB

      • memory/912-59-0x0000000000400000-0x000000000047E000-memory.dmp

        Filesize

        504KB

      • memory/956-60-0x0000000000400000-0x000000000047E000-memory.dmp

        Filesize

        504KB

      • memory/956-62-0x0000000000400000-0x000000000047E000-memory.dmp

        Filesize

        504KB

      • memory/956-65-0x0000000000400000-0x000000000047E000-memory.dmp

        Filesize

        504KB

      • memory/1648-61-0x0000000000400000-0x000000000047E000-memory.dmp

        Filesize

        504KB

      • memory/1648-63-0x0000000000400000-0x000000000047E000-memory.dmp

        Filesize

        504KB

      • memory/1648-64-0x0000000000400000-0x000000000047E000-memory.dmp

        Filesize

        504KB