Analysis

  • max time kernel
    107s
  • max time network
    187s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 16:18

General

  • Target

    3ad65c4a8791f1e4bf3defd8fbcc4015af45511115f66574c36c20e42f890885.exe

  • Size

    507KB

  • MD5

    e0e98a93b5c0cf984042777eeb755143

  • SHA1

    34cc49a168b5ad70fae8f8d4e761a7838d996254

  • SHA256

    3ad65c4a8791f1e4bf3defd8fbcc4015af45511115f66574c36c20e42f890885

  • SHA512

    3eb32dc99f3371f0d20f514908b7268930e805cd702b65b310ef8642bdde3e04347b908e95ab42ee5039c2da84666845361182386e70a47a0f17f1ce47735aa8

  • SSDEEP

    6144:nuus6b967gP2S/rMopScsJAHwVo0UXyUdBs8ew6lcJ6sTKRozCzIcN5fcFkJr/W1:ds6cvUrM6ScoouUd6h+UoWz4uWWy6C

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ad65c4a8791f1e4bf3defd8fbcc4015af45511115f66574c36c20e42f890885.exe
    "C:\Users\Admin\AppData\Local\Temp\3ad65c4a8791f1e4bf3defd8fbcc4015af45511115f66574c36c20e42f890885.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:300
    • C:\Users\Admin\AppData\Local\Temp\3ad65c4a8791f1e4bf3defd8fbcc4015af45511115f66574c36c20e42f890885.exe
      start
      2⤵
        PID:1000
      • C:\Users\Admin\AppData\Local\Temp\3ad65c4a8791f1e4bf3defd8fbcc4015af45511115f66574c36c20e42f890885.exe
        watch
        2⤵
          PID:1460

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/300-54-0x0000000075C11000-0x0000000075C13000-memory.dmp

        Filesize

        8KB

      • memory/300-55-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/300-60-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/1000-61-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/1000-63-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/1000-65-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/1460-62-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/1460-64-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/1460-66-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB