Analysis

  • max time kernel
    234s
  • max time network
    336s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 16:32

General

  • Target

    9f60e37aa8dc044ec09feb3721ec766f2e8a52e7d90994a0a0a20202152dfcc1.exe

  • Size

    61KB

  • MD5

    1d3c4d14373c6d8c6db225cf8d579705

  • SHA1

    bcfc3a5468a01afc4b7448c711e1edb3016cc00a

  • SHA256

    9f60e37aa8dc044ec09feb3721ec766f2e8a52e7d90994a0a0a20202152dfcc1

  • SHA512

    fddd9b55e6293695d01fe41c362cb495380593f2583616d74fd6412c881e069a9db5289a2a73bd141f89df3664ff8ed370d0a7fb5b989529e269ea1c37007ccc

  • SSDEEP

    1536:JVFxVGzC628FIYDrd1bc0S7rp1UkvVTskg:/+CgDDctRW

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f60e37aa8dc044ec09feb3721ec766f2e8a52e7d90994a0a0a20202152dfcc1.exe
    "C:\Users\Admin\AppData\Local\Temp\9f60e37aa8dc044ec09feb3721ec766f2e8a52e7d90994a0a0a20202152dfcc1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:516
    • C:\Users\Admin\AppData\Local\Temp\9f60e37aa8dc044ec09feb3721ec766f2e8a52e7d90994a0a0a20202152dfcc1.exe
      C:\Users\Admin\AppData\Local\Temp\9f60e37aa8dc044ec" 48
      2⤵
        PID:564

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/516-54-0x0000000075551000-0x0000000075553000-memory.dmp

      Filesize

      8KB

    • memory/564-57-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB