Analysis

  • max time kernel
    41s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 03:36

General

  • Target

    71ed1fc538558db3c8c20bbf7e5dcd78eb7567478ff47c16ca8654af291daa56.exe

  • Size

    61KB

  • MD5

    0561c7fc459a7cc0a7dfdf940f0b7f68

  • SHA1

    b21a8c32bdf65740e1bcff970b552f7a53db4861

  • SHA256

    71ed1fc538558db3c8c20bbf7e5dcd78eb7567478ff47c16ca8654af291daa56

  • SHA512

    289ed7d1436772cf68ac9b678367ca404373546633e622b2a9c5ccf13d3d4e9ffd26fee667b7ccb2a66aec39a14e5f97ea906c1d74c50da3c33d71040c16b4ae

  • SSDEEP

    1536:O+Wj5xejGOC6g8HKhsR8+z5uZ20Je+XOkhtb1oaZv18AU9vVTskg:uu3CERRz5a20oTkloaZtnyW

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71ed1fc538558db3c8c20bbf7e5dcd78eb7567478ff47c16ca8654af291daa56.exe
    "C:\Users\Admin\AppData\Local\Temp\71ed1fc538558db3c8c20bbf7e5dcd78eb7567478ff47c16ca8654af291daa56.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\71ed1fc538558db3c8c20bbf7e5dcd78eb7567478ff47c16ca8654af291daa56.exe
      C:\Users\Admin\AppData\Local\Temp\71ed1fc538558db3c" 48
      2⤵
        PID:1528

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1528-57-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/2036-54-0x0000000076381000-0x0000000076383000-memory.dmp

      Filesize

      8KB