Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-01-2023 10:15
Static task
static1
Behavioral task
behavioral1
Sample
d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe
Resource
win10v2004-20220812-en
General
-
Target
d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe
-
Size
225KB
-
MD5
b05ea5fd73d25140cdb31f36789d9003
-
SHA1
104546947824a7ecc82e52214855825380251353
-
SHA256
d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490
-
SHA512
0ab7420c6f57048f400da9581322255bd8c8711dd8aa42baa4d7e4df8299858453f8c6e962539bcf8baecff2f7a30549f9c0de44a3b09e5ab5c6109f20f0692b
-
SSDEEP
3072:onTbUOF+nL6NIpUSNX0W+eBNyBNmbylKvJCDVe+2Ja36mLXYr238+XrdblRHHHCD:cTbUO06C7X0W3UylgMJa3nX62NcAj9n
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exed350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exedescription pid process target process PID 1272 wrote to memory of 1328 1272 d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe PID 1272 wrote to memory of 1328 1272 d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe PID 1272 wrote to memory of 1328 1272 d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe PID 1272 wrote to memory of 1328 1272 d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe PID 1328 wrote to memory of 1144 1328 d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe svchost.exe PID 1328 wrote to memory of 1144 1328 d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe svchost.exe PID 1328 wrote to memory of 1144 1328 d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe svchost.exe PID 1328 wrote to memory of 1144 1328 d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe svchost.exe PID 1328 wrote to memory of 1144 1328 d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe svchost.exe PID 1328 wrote to memory of 1144 1328 d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe svchost.exe PID 1328 wrote to memory of 1144 1328 d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe"C:\Users\Admin\AppData\Local\Temp\d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe"C:\Users\Admin\AppData\Local\Temp\d350d150f658a32c32984d7f879c6f3b3ddb6ba7918bfe22e19471a79a0cd490.exe" -q=1737576962⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1144-60-0x0000000000060000-0x000000000006C000-memory.dmpFilesize
48KB
-
memory/1144-65-0x0000000000000000-mapping.dmp
-
memory/1144-68-0x0000000075931000-0x0000000075933000-memory.dmpFilesize
8KB
-
memory/1272-54-0x00000000008CD000-0x00000000008DA000-memory.dmpFilesize
52KB
-
memory/1272-55-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/1272-56-0x00000000008CD000-0x00000000008DA000-memory.dmpFilesize
52KB
-
memory/1328-57-0x0000000000000000-mapping.dmp
-
memory/1328-58-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/1328-59-0x0000000000624000-0x0000000000630000-memory.dmpFilesize
48KB
-
memory/1328-66-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/1328-67-0x0000000000624000-0x0000000000630000-memory.dmpFilesize
48KB