Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 00:53

General

  • Target

    8dcee95282f0b014639a828aee7098e1.exe

  • Size

    28KB

  • MD5

    8dcee95282f0b014639a828aee7098e1

  • SHA1

    060ecef53e96fcf14cde9b468d4ac690794a190a

  • SHA256

    71926747cd98026114de5b050afa12d3b59576f047fd055d1f5ca3fc10399bcd

  • SHA512

    74a69a422d5d7f329e026cd870ac2908bfb282759c1fa3f4abeaf3fe883c65b89b318be8bdd5764834e76af3c2bc071adf5d59b378ec29ad96af24d6a566b53e

  • SSDEEP

    384:sFyH905eSH8E1xvqXCO25jwHwAax4XltZfJGcMJxDTHfRmNZYV:sFxRO25Hx41tDMTDT/RmNe

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8dcee95282f0b014639a828aee7098e1.exe
    "C:\Users\Admin\AppData\Local\Temp\8dcee95282f0b014639a828aee7098e1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
        PID:2076

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3016-0-0x0000000000010000-0x000000000001E000-memory.dmp

      Filesize

      56KB