Analysis

  • max time kernel
    53s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 14:41

General

  • Target

    c29d0bfbe4490e8015c17553053ace099b5397273be7eddb90f5564640f3f88a.exe

  • Size

    72KB

  • MD5

    1aed5c24db94e10b4592896caf8aba89

  • SHA1

    f71d73cbacf99a811e3f82405ff901069ea213c6

  • SHA256

    c29d0bfbe4490e8015c17553053ace099b5397273be7eddb90f5564640f3f88a

  • SHA512

    5079478c2b56b15a314b50d32d4ef1a1a8399ca633e111c9eb937bce4eed86155f4a93ab9831d3e7bb464bfdec0c0d1a0e732b6a14e600cb8704384ee46e3ea6

  • SSDEEP

    768:u8mxJOK0/F0kr6Juvfx/oRqndvtpvBVZw:F/6kr6Jux/oRqndvT3G

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c29d0bfbe4490e8015c17553053ace099b5397273be7eddb90f5564640f3f88a.exe
    "C:\Users\Admin\AppData\Local\Temp\c29d0bfbe4490e8015c17553053ace099b5397273be7eddb90f5564640f3f88a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:580
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C C:\1.bat
      2⤵
      • Deletes itself
      PID:576

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\1.bat

    Filesize

    273B

    MD5

    0b0f0bae3d464030e840ff472ea5127d

    SHA1

    77da98111bbee0267703fe49343528b3cf917871

    SHA256

    33a31d965a59ab1002a5a43ebb562c2f2216b575b2af2cc36ed44c7df93fe418

    SHA512

    bf71da036115e07668eb8feededaefa09a189553590df66b8931f8f5f95843fa7da455eaa912abd37943a424033143aa2e26e6d7dc15dc398643c248d5d3486b

  • memory/576-54-0x0000000000000000-mapping.dmp