Analysis

  • max time kernel
    41s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 16:48

General

  • Target

    015f1f8a09a139fc914d6bdcede65af90d2f22d0b71ebb83827085dcec2c74eb.exe

  • Size

    489KB

  • MD5

    66773533ef92b2d83eb547715fc5c722

  • SHA1

    7c7eb5df403572ae7b3fb0bb394ca25173f3cee3

  • SHA256

    015f1f8a09a139fc914d6bdcede65af90d2f22d0b71ebb83827085dcec2c74eb

  • SHA512

    00351200a96f38be4f4965aba40c6915466f55e62c5109fcb94d587068c20a39f24905d045c3744641b7cc4243a8c1ceb7a434436bd02b2eb8dfd2852a6d6ccd

  • SSDEEP

    12288:33S7U3+0x7spK3jRvjWYBbHEuJH6HZoy6:HSg3DRspejRS+Ea6HyB

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\015f1f8a09a139fc914d6bdcede65af90d2f22d0b71ebb83827085dcec2c74eb.exe
    "C:\Users\Admin\AppData\Local\Temp\015f1f8a09a139fc914d6bdcede65af90d2f22d0b71ebb83827085dcec2c74eb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Users\Admin\AppData\Local\Temp\015f1f8a09a139fc914d6bdcede65af90d2f22d0b71ebb83827085dcec2c74eb.exe
      start
      2⤵
        PID:1272
      • C:\Users\Admin\AppData\Local\Temp\015f1f8a09a139fc914d6bdcede65af90d2f22d0b71ebb83827085dcec2c74eb.exe
        watch
        2⤵
          PID:1728

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1272-62-0x0000000000400000-0x0000000000480000-memory.dmp

        Filesize

        512KB

      • memory/1272-63-0x0000000000400000-0x0000000000480000-memory.dmp

        Filesize

        512KB

      • memory/1700-54-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

        Filesize

        8KB

      • memory/1700-55-0x0000000000400000-0x0000000000480000-memory.dmp

        Filesize

        512KB

      • memory/1700-60-0x0000000000400000-0x0000000000480000-memory.dmp

        Filesize

        512KB

      • memory/1728-61-0x0000000000400000-0x0000000000480000-memory.dmp

        Filesize

        512KB

      • memory/1728-64-0x0000000000400000-0x0000000000480000-memory.dmp

        Filesize

        512KB