Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 00:31

General

  • Target

    2338fa52b6748b1829c39e8c8ced23277927aa0d0c545e3ac51badf27c9ff820.exe

  • Size

    592KB

  • MD5

    1389346345d81c72c0a915b38d724051

  • SHA1

    d22c367044b54a83275d4c69a9b35020460f30cb

  • SHA256

    2338fa52b6748b1829c39e8c8ced23277927aa0d0c545e3ac51badf27c9ff820

  • SHA512

    dc9c33c73720841f81fb9ab854549c3a30fd290de411afdcb33f354f4ef2f1483b1391b85f6f1a7198a7de04ddc2492149ffabb6fe6e3f198e0c2a0924a82338

  • SSDEEP

    12288:OQwh/X9K4zaJiw0jh7c0K+cuONCJSbELNJ:OQwh/X9DaJiw07xKXjuLN

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2338fa52b6748b1829c39e8c8ced23277927aa0d0c545e3ac51badf27c9ff820.exe
    "C:\Users\Admin\AppData\Local\Temp\2338fa52b6748b1829c39e8c8ced23277927aa0d0c545e3ac51badf27c9ff820.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\2338fa52b6748b1829c39e8c8ced23277927aa0d0c545e3ac51badf27c9ff820.exe
      start
      2⤵
        PID:1240
      • C:\Users\Admin\AppData\Local\Temp\2338fa52b6748b1829c39e8c8ced23277927aa0d0c545e3ac51badf27c9ff820.exe
        watch
        2⤵
          PID:1256

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1240-64-0x0000000005000000-0x0000000005069000-memory.dmp

        Filesize

        420KB

      • memory/1240-65-0x0000000000BA5000-0x0000000000BB6000-memory.dmp

        Filesize

        68KB

      • memory/1240-66-0x0000000005000000-0x0000000005069000-memory.dmp

        Filesize

        420KB

      • memory/1256-62-0x0000000005000000-0x0000000005069000-memory.dmp

        Filesize

        420KB

      • memory/1256-63-0x0000000000885000-0x0000000000896000-memory.dmp

        Filesize

        68KB

      • memory/1256-67-0x0000000005000000-0x0000000005069000-memory.dmp

        Filesize

        420KB

      • memory/1632-54-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

        Filesize

        8KB

      • memory/1632-58-0x0000000000400000-0x0000000000497000-memory.dmp

        Filesize

        604KB

      • memory/1632-59-0x0000000005000000-0x0000000005069000-memory.dmp

        Filesize

        420KB

      • memory/1632-61-0x0000000000545000-0x0000000000556000-memory.dmp

        Filesize

        68KB