Analysis

  • max time kernel
    2s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 10:24

General

  • Target

    a2c875e7f5cd68a1a8795ed247e71568a1c1637e25d4309563be9f2a262d3e68.exe

  • Size

    320KB

  • MD5

    3ae2f266c6e19a1e4d196792c0e1a777

  • SHA1

    76f1f448669ec7f3236ea001b389389405776f0b

  • SHA256

    a2c875e7f5cd68a1a8795ed247e71568a1c1637e25d4309563be9f2a262d3e68

  • SHA512

    0c029b371a7023188365e4f26eedaad754adc9241f771b75bf8679e5444f2b9685d39ffe316d1e4f41d69182b61b027ad3e7e56a93af86de6fdf5c8d079de04e

  • SSDEEP

    6144:njFAyq8Ik3rFFIZ8C4B8stQ18F3Sqqzsu4HqPsJY10V1RGCZlrMVnM:nRTIWFIZ8Viqq4u4Hq0Jq0xZUM

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2c875e7f5cd68a1a8795ed247e71568a1c1637e25d4309563be9f2a262d3e68.exe
    "C:\Users\Admin\AppData\Local\Temp\a2c875e7f5cd68a1a8795ed247e71568a1c1637e25d4309563be9f2a262d3e68.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Users\Admin\AppData\Local\Temp\a2c875e7f5cd68a1a8795ed247e71568a1c1637e25d4309563be9f2a262d3e68.exe
      C:\Users\Admin\AppData\Local\Temp\a2c875e7f5cd68a1a8795ed247e71568a1c1637e25d4309563be9f2a262d3e68.exe
      2⤵
        PID:2040

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads