Analysis

  • max time kernel
    83s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 01:54

General

  • Target

    8944f5b067be233c100af6d4a24ad4c049a9b94d1d2dde3c579aee27c29eb2f3.exe

  • Size

    56KB

  • MD5

    81738f40eb9132b9e5099b1db16359b6

  • SHA1

    23c02339cca727a423471bafdd7c005fa81fc80d

  • SHA256

    8944f5b067be233c100af6d4a24ad4c049a9b94d1d2dde3c579aee27c29eb2f3

  • SHA512

    abd216562d97ff5031ef53f445141eee8e3f27cd15a70a1f1b2cb949c23fbecdec936f8ccb4808a167a38d0bc58ac7dbc08bd127c889be3c4fe5ccb398bb349e

  • SSDEEP

    1536:5qCq88OKFLPcNSasLk7ZggkZk38XxavVTskg:5qC8FLPcDftMXx8W

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8944f5b067be233c100af6d4a24ad4c049a9b94d1d2dde3c579aee27c29eb2f3.exe
    "C:\Users\Admin\AppData\Local\Temp\8944f5b067be233c100af6d4a24ad4c049a9b94d1d2dde3c579aee27c29eb2f3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\8944f5b067be233c100af6d4a24ad4c049a9b94d1d2dde3c579aee27c29eb2f3.exe
      C:\Users\Admin\AppData\Local\Temp\8944f5b067be233c1" 48
      2⤵
        PID:556

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/556-57-0x0000000010000000-0x000000001000C000-memory.dmp

      Filesize

      48KB

    • memory/1236-54-0x0000000074FD1000-0x0000000074FD3000-memory.dmp

      Filesize

      8KB