Analysis

  • max time kernel
    38s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    07/12/2022, 01:11

General

  • Target

    16484b9d7e2c442b2f5e88c82e7bc2aeaecd97ae6774e5fb66d30fce33bf2542.exe

  • Size

    25KB

  • MD5

    0b7303c46332567f76be86e97a6d65d0

  • SHA1

    aa22f76d1f75e9e57126abf92296378ddcedf740

  • SHA256

    16484b9d7e2c442b2f5e88c82e7bc2aeaecd97ae6774e5fb66d30fce33bf2542

  • SHA512

    db748abe6088bd5d2107d1891b8d57f0edbcc779eeb9ea64990641bab338c7c3801139befb8b8be69907ebb61a55f2b3a0dab9ce0f434d115aa51d31c2272bb9

  • SSDEEP

    768:ckOCpi9HFRraWhBfQTf2uxSv4itKXFYzWhvrx3ha5:ckNpcj1b+nit1zgP

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16484b9d7e2c442b2f5e88c82e7bc2aeaecd97ae6774e5fb66d30fce33bf2542.exe
    "C:\Users\Admin\AppData\Local\Temp\16484b9d7e2c442b2f5e88c82e7bc2aeaecd97ae6774e5fb66d30fce33bf2542.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
        PID:668

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1108-55-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB