Analysis

  • max time kernel
    84s
  • max time network
    70s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 06:46

General

  • Target

    0ac41062d20c64cd0da34df45c9c667493ad099c27be7d23fb7196e1b4b55440.exe

  • Size

    55KB

  • MD5

    69d1147487532dbc6a5641495bceb03b

  • SHA1

    1d9a44cfe6c8c7c2534db0bd45232735e12e7d98

  • SHA256

    0ac41062d20c64cd0da34df45c9c667493ad099c27be7d23fb7196e1b4b55440

  • SHA512

    b5d160aca1768202cef89284b1ee2de9e67e895795680ce259a20f664e6c59388114580a76e573ce8354c88a3fe9b146db1aef1d468a04783c1c2c83995a3610

  • SSDEEP

    1536:s51CzCqx8CRSO3MYfsKUO18p9D0avVTskg:s58zC8sUdbUJi8W

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ac41062d20c64cd0da34df45c9c667493ad099c27be7d23fb7196e1b4b55440.exe
    "C:\Users\Admin\AppData\Local\Temp\0ac41062d20c64cd0da34df45c9c667493ad099c27be7d23fb7196e1b4b55440.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Users\Admin\AppData\Local\Temp\0ac41062d20c64cd0da34df45c9c667493ad099c27be7d23fb7196e1b4b55440.exe
      C:\Users\Admin\AppData\Local\Temp\0ac41062d20c64cd0" 48
      2⤵
        PID:1496

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1496-57-0x0000000010000000-0x000000001000C000-memory.dmp

      Filesize

      48KB

    • memory/1980-54-0x00000000767B1000-0x00000000767B3000-memory.dmp

      Filesize

      8KB