Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 14:51

General

  • Target

    4515b624a02c4cf13a783f00e5edef9a563dbcd243fafebf22b3bf0192fd7f1f.exe

  • Size

    113KB

  • MD5

    28c3ad423f6b26e78830372ad1c22ed0

  • SHA1

    d450d0754335098c5212deaac3d662c1dcbadc9f

  • SHA256

    4515b624a02c4cf13a783f00e5edef9a563dbcd243fafebf22b3bf0192fd7f1f

  • SHA512

    e706e4650a3f234c7d952fb3be030dfd197c1b014f4b8c40db899abc6f03c21b961ae2855a67b4740d67a0fc89187f3d2d7f4d8eb23749869c2e86ad30561322

  • SSDEEP

    3072:uJlGLgfPT6PWcpdcb+yL8rqRkyrW8qICM5p:P5ecgbj8rEVTCM

Score
1/10

Malware Config

Signatures

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1396
      • C:\Users\Admin\AppData\Local\Temp\4515b624a02c4cf13a783f00e5edef9a563dbcd243fafebf22b3bf0192fd7f1f.exe
        "C:\Users\Admin\AppData\Local\Temp\4515b624a02c4cf13a783f00e5edef9a563dbcd243fafebf22b3bf0192fd7f1f.exe"
        2⤵
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:768

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/768-54-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/768-58-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/1396-57-0x00000000026C0000-0x00000000026C9000-memory.dmp

      Filesize

      36KB

    • memory/1396-55-0x00000000026C0000-0x00000000026C9000-memory.dmp

      Filesize

      36KB