Analysis

  • max time kernel
    151s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 09:42

General

  • Target

    b611922433a28de7023e6c806cc23988c210c2728bf00b050dc79ba078973ff3.exe

  • Size

    70KB

  • MD5

    ff8e65a42de10273ce4209248049f39b

  • SHA1

    6ab33cca5f68bfb83c9c88cf70ea68fb9c3ffc94

  • SHA256

    b611922433a28de7023e6c806cc23988c210c2728bf00b050dc79ba078973ff3

  • SHA512

    2a214835d1ca02af9cd6451ec25740b2e33050ab9d551bac15ee4af26c77366ef82323c915eb1a2a03dac323eee57bc1a524c3216376ba3905c08f6f23129142

  • SSDEEP

    1536:tN9MThxsVblMPagJdvNRJBUtUZKfGOZi2ExjmKhBAJpf+fy0BS:mhObZgJ1zCUYJZq6pf+fy0BS

Score
1/10

Malware Config

Signatures

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b611922433a28de7023e6c806cc23988c210c2728bf00b050dc79ba078973ff3.exe
    "C:\Users\Admin\AppData\Local\Temp\b611922433a28de7023e6c806cc23988c210c2728bf00b050dc79ba078973ff3.exe"
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:1580

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1580-56-0x0000000000090000-0x0000000000099000-memory.dmp

      Filesize

      36KB

    • memory/1580-58-0x0000000000090000-0x0000000000099000-memory.dmp

      Filesize

      36KB

    • memory/1580-61-0x0000000000020000-0x0000000000028000-memory.dmp

      Filesize

      32KB

    • memory/1580-62-0x0000000000090000-0x0000000000099000-memory.dmp

      Filesize

      36KB

    • memory/1580-63-0x0000000000090000-0x0000000000099000-memory.dmp

      Filesize

      36KB

    • memory/1672-54-0x0000000000240000-0x0000000000252000-memory.dmp

      Filesize

      72KB

    • memory/1672-55-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/1672-60-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB