Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2024, 18:34

General

  • Target

    7db49b73a7c568c1d747e05252f6e954.exe

  • Size

    1.1MB

  • MD5

    7db49b73a7c568c1d747e05252f6e954

  • SHA1

    1e366f45bb5279ec14a42fc2f166495733e15569

  • SHA256

    ed347a18d12500d26dc05c6c069bab57be4ac0b0bd8c964e8130b5f6333ed41a

  • SHA512

    142dc05c36eda8c37c56ece1a499b062ac02813da7a3b3f1f8897282d93b829f3ab44ce7c8eca898af66e0a851f58bacbc29cd5430bf4a046069b65d386b5a41

  • SSDEEP

    24576:muXuZlF7J3fy1S1EC9a4yCoEU7pYBjS3F4aPX5O0:XeZlFN8zW5yCoEIp6jS605O0

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\7db49b73a7c568c1d747e05252f6e954.exe
        "C:\Users\Admin\AppData\Local\Temp\7db49b73a7c568c1d747e05252f6e954.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3012

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1260-4-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

            Filesize

            4KB

          • memory/1260-11-0x000000007EFC0000-0x000000007EFC6000-memory.dmp

            Filesize

            24KB

          • memory/3012-1-0x0000000001D40000-0x0000000001E35000-memory.dmp

            Filesize

            980KB

          • memory/3012-0-0x0000000000260000-0x0000000000261000-memory.dmp

            Filesize

            4KB

          • memory/3012-3-0x0000000000400000-0x000000000051D035-memory.dmp

            Filesize

            1.1MB

          • memory/3012-5-0x0000000010000000-0x0000000010011000-memory.dmp

            Filesize

            68KB