Analysis

  • max time kernel
    41s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 03:07

General

  • Target

    785bbe2bff51b072dc93d32ec8b03c353a93768a0e3471a9f70b0c540c6bfaf1.exe

  • Size

    61KB

  • MD5

    b52f22e083d5be82ad2957bce5bd3bcd

  • SHA1

    db8e80b8113e35d57dd5a06f516fc9248b1f8f5f

  • SHA256

    785bbe2bff51b072dc93d32ec8b03c353a93768a0e3471a9f70b0c540c6bfaf1

  • SHA512

    56c2b507b6cd708f2c6f6f7397857875f9e8d13825f957ee8cce0b48b2a0e12b1d897e32b9df90715549c09724a4dc39f1c664af0d59f8dcc438c24ec6aca5e9

  • SSDEEP

    1536:3Q6aE/C6X8boJ+F/XiRMKSFAyvBYvVTskg:tvCsAa9gAyvBeW

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\785bbe2bff51b072dc93d32ec8b03c353a93768a0e3471a9f70b0c540c6bfaf1.exe
    "C:\Users\Admin\AppData\Local\Temp\785bbe2bff51b072dc93d32ec8b03c353a93768a0e3471a9f70b0c540c6bfaf1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Users\Admin\AppData\Local\Temp\785bbe2bff51b072dc93d32ec8b03c353a93768a0e3471a9f70b0c540c6bfaf1.exe
      C:\Users\Admin\AppData\Local\Temp\785bbe2bff51b072d" 48
      2⤵
        PID:2000

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/816-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

            Filesize

            8KB

          • memory/2000-57-0x0000000010000000-0x000000001000D000-memory.dmp

            Filesize

            52KB