Analysis

  • max time kernel
    69s
  • max time network
    109s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 09:47

General

  • Target

    fcfb492d3ee5aed782e92f92a9e72fd72f07858f064ad1c0f68678bd2e94f99e.exe

  • Size

    529KB

  • MD5

    7c91c0ddbf84bd6996621983a48dfaab

  • SHA1

    e9e0c447afcae09a2bb9a31ac4ecccab0717256e

  • SHA256

    fcfb492d3ee5aed782e92f92a9e72fd72f07858f064ad1c0f68678bd2e94f99e

  • SHA512

    77baf7a3b9a08e552cc97712057e82b528ddea30060f0c6c291c68f212e394db944ac3819ed9464e1003a121cf9f35aa2273ed93f89e074ff33be8004958c409

  • SSDEEP

    6144:Y2ZCwqKivuVeeLmJY6qIQqZTpDYeg1apy3291eXaN7ggH+ukTgZZno3aPQicBI0F:Y2Z9qK/6hTQZ0py3291sa6vT9Z6q0mp

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcfb492d3ee5aed782e92f92a9e72fd72f07858f064ad1c0f68678bd2e94f99e.exe
    "C:\Users\Admin\AppData\Local\Temp\fcfb492d3ee5aed782e92f92a9e72fd72f07858f064ad1c0f68678bd2e94f99e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\Users\Admin\AppData\Local\Temp\fcfb492d3ee5aed782e92f92a9e72fd72f07858f064ad1c0f68678bd2e94f99e.exe
      start
      2⤵
        PID:1484
      • C:\Users\Admin\AppData\Local\Temp\fcfb492d3ee5aed782e92f92a9e72fd72f07858f064ad1c0f68678bd2e94f99e.exe
        watch
        2⤵
          PID:1120

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1120-61-0x0000000000400000-0x000000000048A000-memory.dmp

        Filesize

        552KB

      • memory/1120-63-0x0000000000400000-0x000000000048A000-memory.dmp

        Filesize

        552KB

      • memory/1120-65-0x0000000000400000-0x000000000048A000-memory.dmp

        Filesize

        552KB

      • memory/1296-54-0x0000000076581000-0x0000000076583000-memory.dmp

        Filesize

        8KB

      • memory/1296-59-0x0000000000400000-0x000000000048A000-memory.dmp

        Filesize

        552KB

      • memory/1484-60-0x0000000000400000-0x000000000048A000-memory.dmp

        Filesize

        552KB

      • memory/1484-62-0x0000000000400000-0x000000000048A000-memory.dmp

        Filesize

        552KB

      • memory/1484-64-0x0000000000400000-0x000000000048A000-memory.dmp

        Filesize

        552KB