Analysis

  • max time kernel
    128s
  • max time network
    219s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 16:35

General

  • Target

    1dd1470b8dfd05a0d672c956b81e83b6e546e478ce996759fcd74da74ccf4c3b.exe

  • Size

    567KB

  • MD5

    2be8a4d7a682a31fcbfebd80cbabe153

  • SHA1

    0d2b83f3405a6ec294541de00aead31eada81281

  • SHA256

    1dd1470b8dfd05a0d672c956b81e83b6e546e478ce996759fcd74da74ccf4c3b

  • SHA512

    4e106260bae254a5c11a13d5e39b7b1840d1e97cdc8637400e81e97278fee46799955b7bb6529d8b11d1aad1a434929a158707a531b622cb1e6ee4bdbb6d731d

  • SSDEEP

    12288:XhvOPbgUH0tildTZgZkCjuxCQ5fzg+cITso6FTvO6QFboJbFGigkrkcqE/iglOAh:XhvXildOZkLx7gFITsoF6QFboJbFW0h

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dd1470b8dfd05a0d672c956b81e83b6e546e478ce996759fcd74da74ccf4c3b.exe
    "C:\Users\Admin\AppData\Local\Temp\1dd1470b8dfd05a0d672c956b81e83b6e546e478ce996759fcd74da74ccf4c3b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\1dd1470b8dfd05a0d672c956b81e83b6e546e478ce996759fcd74da74ccf4c3b.exe
      start
      2⤵
        PID:1716
      • C:\Users\Admin\AppData\Local\Temp\1dd1470b8dfd05a0d672c956b81e83b6e546e478ce996759fcd74da74ccf4c3b.exe
        watch
        2⤵
          PID:296

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/296-65-0x0000000005000000-0x0000000005069000-memory.dmp

              Filesize

              420KB

            • memory/296-66-0x0000000000625000-0x0000000000636000-memory.dmp

              Filesize

              68KB

            • memory/296-69-0x0000000005000000-0x0000000005069000-memory.dmp

              Filesize

              420KB

            • memory/1672-59-0x0000000000400000-0x000000000048F000-memory.dmp

              Filesize

              572KB

            • memory/1672-60-0x0000000005000000-0x0000000005069000-memory.dmp

              Filesize

              420KB

            • memory/1672-55-0x0000000075831000-0x0000000075833000-memory.dmp

              Filesize

              8KB

            • memory/1672-54-0x0000000000400000-0x000000000048F000-memory.dmp

              Filesize

              572KB

            • memory/1672-62-0x0000000000805000-0x0000000000816000-memory.dmp

              Filesize

              68KB

            • memory/1716-64-0x00000000007F5000-0x0000000000806000-memory.dmp

              Filesize

              68KB

            • memory/1716-68-0x0000000005000000-0x0000000005069000-memory.dmp

              Filesize

              420KB

            • memory/1716-67-0x0000000005000000-0x0000000005069000-memory.dmp

              Filesize

              420KB

            • memory/1716-63-0x0000000005000000-0x0000000005069000-memory.dmp

              Filesize

              420KB