Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 09:23

General

  • Target

    c303a2760df774d2fff4bd56743e7063.exe

  • Size

    585KB

  • MD5

    c303a2760df774d2fff4bd56743e7063

  • SHA1

    d22f3a0b82bb175b2eb1fecb6babc2f75ab91640

  • SHA256

    e2cc18e2303690d6216cadd1ad8c8607dded1e47cd4803cf4a20da9b1854dedf

  • SHA512

    93d457868f4d6e825888c79e46b29231f33f558da892ab2ea3eb76fba27d4b90c5b02bc5b9a47290f0c9632a05ac4d449547be858b29740e87f149b3f332a1b4

  • SSDEEP

    12288:os7THcUyaPRioTOxoG+qnnc+ygOrb3IWREImrpnKc3T3obMksL7uCSK+BNihHAp0:D8gM+CACSfih

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c303a2760df774d2fff4bd56743e7063.exe
    "C:\Users\Admin\AppData\Local\Temp\c303a2760df774d2fff4bd56743e7063.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\notepad.exe
      C:\Windows\notepad.exe
      2⤵
        PID:2524

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2360-0-0x00000000747E0000-0x0000000074D8B000-memory.dmp

            Filesize

            5.7MB

          • memory/2360-1-0x00000000747E0000-0x0000000074D8B000-memory.dmp

            Filesize

            5.7MB

          • memory/2360-2-0x0000000000C10000-0x0000000000C50000-memory.dmp

            Filesize

            256KB

          • memory/2360-3-0x00000000747E0000-0x0000000074D8B000-memory.dmp

            Filesize

            5.7MB