Analysis

  • max time kernel
    152s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 03:55

General

  • Target

    d9588f311e90e9e1338ef5505b8515b25f768f9e8034943121642e9638956e95.exe

  • Size

    112KB

  • MD5

    8300ea57d0f38566c601b0b3e9b8ae9e

  • SHA1

    5d969199403db9c7d8ce5de90378483474e5e534

  • SHA256

    d9588f311e90e9e1338ef5505b8515b25f768f9e8034943121642e9638956e95

  • SHA512

    a76a384eb2b12c09af6f30432020cc388b09fd23bb4824a798ad31dbf5d5af8b7a8116bef8c7f87b600cd607dbd93ec6f015a9a469686a919941280d90f55515

  • SSDEEP

    1536:zqm51coXbI+ZluF+AGXhVIBL7STXDYZ/NdDFRDuhdyUkdgtr9d/WCMfxe:znTXbdHNXkBfxR3DFVuryUVvWLf

Score
1/10

Malware Config

Signatures

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9588f311e90e9e1338ef5505b8515b25f768f9e8034943121642e9638956e95.exe
    "C:\Users\Admin\AppData\Local\Temp\d9588f311e90e9e1338ef5505b8515b25f768f9e8034943121642e9638956e95.exe"
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:520

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/520-54-0x00000000000C0000-0x00000000000C9000-memory.dmp

      Filesize

      36KB

    • memory/520-56-0x00000000000C0000-0x00000000000C9000-memory.dmp

      Filesize

      36KB

    • memory/520-59-0x0000000000530000-0x0000000000538000-memory.dmp

      Filesize

      32KB

    • memory/520-60-0x00000000000C0000-0x00000000000C9000-memory.dmp

      Filesize

      36KB

    • memory/944-58-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB