Analysis

  • max time kernel
    19s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    09-12-2022 22:07

General

  • Target

    3b17be70fb201b2352f0a5d5a2b4f783e18350a13628b96c80c3d4e8c1fdd0b5.exe

  • Size

    801KB

  • MD5

    beb27d2d76a11793bd4f7cb8c3cec343

  • SHA1

    3fcfe3b2be699e78f1bcd4136499d805191d76b4

  • SHA256

    3b17be70fb201b2352f0a5d5a2b4f783e18350a13628b96c80c3d4e8c1fdd0b5

  • SHA512

    2d85f07698b9b2c3e2de47e8182bb0e227c7daebf56611cf38cd665df0510adde4c984414d54961c9db7a033ab388a2aa471db7bff30eeb5d96e4c4b3f34f99c

  • SSDEEP

    12288:iwBoY9FDutOg6duUKLo7BkvKpDeSp+7732pQlS3WWu41rXSQTlrOBZ3wIQTIddpn:rIvKpKSpgTMFioJOFigEa3zQtmAI

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b17be70fb201b2352f0a5d5a2b4f783e18350a13628b96c80c3d4e8c1fdd0b5.exe
    "C:\Users\Admin\AppData\Local\Temp\3b17be70fb201b2352f0a5d5a2b4f783e18350a13628b96c80c3d4e8c1fdd0b5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Local\Temp\3b17be70fb201b2352f0a5d5a2b4f783e18350a13628b96c80c3d4e8c1fdd0b5.exe
      "C:\Users\Admin\AppData\Local\Temp\3b17be70fb201b2352f0a5d5a2b4f783e18350a13628b96c80c3d4e8c1fdd0b5.exe"
      2⤵
        PID:1744
      • C:\Users\Admin\AppData\Local\Temp\3b17be70fb201b2352f0a5d5a2b4f783e18350a13628b96c80c3d4e8c1fdd0b5.exe
        "C:\Users\Admin\AppData\Local\Temp\3b17be70fb201b2352f0a5d5a2b4f783e18350a13628b96c80c3d4e8c1fdd0b5.exe"
        2⤵
          PID:948
        • C:\Users\Admin\AppData\Local\Temp\3b17be70fb201b2352f0a5d5a2b4f783e18350a13628b96c80c3d4e8c1fdd0b5.exe
          "C:\Users\Admin\AppData\Local\Temp\3b17be70fb201b2352f0a5d5a2b4f783e18350a13628b96c80c3d4e8c1fdd0b5.exe"
          2⤵
            PID:1584
          • C:\Users\Admin\AppData\Local\Temp\3b17be70fb201b2352f0a5d5a2b4f783e18350a13628b96c80c3d4e8c1fdd0b5.exe
            "C:\Users\Admin\AppData\Local\Temp\3b17be70fb201b2352f0a5d5a2b4f783e18350a13628b96c80c3d4e8c1fdd0b5.exe"
            2⤵
              PID:1616
            • C:\Users\Admin\AppData\Local\Temp\3b17be70fb201b2352f0a5d5a2b4f783e18350a13628b96c80c3d4e8c1fdd0b5.exe
              "C:\Users\Admin\AppData\Local\Temp\3b17be70fb201b2352f0a5d5a2b4f783e18350a13628b96c80c3d4e8c1fdd0b5.exe"
              2⤵
                PID:1736

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1952-54-0x0000000000350000-0x000000000041E000-memory.dmp

              Filesize

              824KB

            • memory/1952-55-0x0000000004C40000-0x0000000004D00000-memory.dmp

              Filesize

              768KB

            • memory/1952-56-0x00000000758C1000-0x00000000758C3000-memory.dmp

              Filesize

              8KB

            • memory/1952-57-0x0000000000330000-0x000000000033A000-memory.dmp

              Filesize

              40KB