Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 12:22

General

  • Target

    6e235f766f274a457ca4cde080f62a6c.exe

  • Size

    115KB

  • MD5

    6e235f766f274a457ca4cde080f62a6c

  • SHA1

    2ae7c4fd19ab094d904071a08bc5222a7e76bff5

  • SHA256

    dc98b7180c9bec8d9cce8126b2f4ac4a529641faf28a2506621aa11ba34ac849

  • SHA512

    41ede2086d09fec28c4098444399393ab38d1968de95a8cd414ea11c8530a1877525119f7a7a3befae3050631b7f12229b119c33deefff923a6a50457cf43c25

  • SSDEEP

    1536:CRA+bB9MHoROAtb44J8p/e4vKyHtPArypo8C+/EGZIFAVW+ZJ9QapA:TuwoR9lJ8Q2ft4EZ/EGZpp9Qap

Score
1/10

Malware Config

Signatures

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e235f766f274a457ca4cde080f62a6c.exe
    "C:\Users\Admin\AppData\Local\Temp\6e235f766f274a457ca4cde080f62a6c.exe"
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:824
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1380

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/824-2-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/1380-1-0x0000000002A40000-0x0000000002A49000-memory.dmp

      Filesize

      36KB

    • memory/1380-0-0x0000000002A40000-0x0000000002A49000-memory.dmp

      Filesize

      36KB