Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 14:53

General

  • Target

    Q240419617024.exe

  • Size

    796KB

  • MD5

    ec784e3a25fff2cf1a080aaa6ca9308a

  • SHA1

    d9e96900db1385742f277aacb709c8ef1d593e46

  • SHA256

    9c82f7dcf28541764fb5b7f9dd618340185f01a56edfdc3f9fa880ebd9c5ca4c

  • SHA512

    6e8d213b7f13ee80213bc939993db6227004cebe3a0cda4f336948df5f919c748c67c70bf3e6f321f1409bd24899ca41d21bc6aa6aed061814b8093bc7a5e62a

  • SSDEEP

    12288:VIpHnx2oqGUUteXkM3mosYGui2Qfrb5M0PZIGquVKTFi+VjsOWZT0w:VsktFkMWosYHQ5LPZIGquV0FtUg

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Q240419617024.exe
    "C:\Users\Admin\AppData\Local\Temp\Q240419617024.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2032 -s 640
      2⤵
        PID:1996

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2032-0-0x000007FEF5C93000-0x000007FEF5C94000-memory.dmp

      Filesize

      4KB

    • memory/2032-1-0x000000013FEA0000-0x000000013FF6C000-memory.dmp

      Filesize

      816KB

    • memory/2032-2-0x000007FEF5C90000-0x000007FEF667C000-memory.dmp

      Filesize

      9.9MB

    • memory/2032-3-0x000007FEF5C93000-0x000007FEF5C94000-memory.dmp

      Filesize

      4KB

    • memory/2032-4-0x000007FEF5C90000-0x000007FEF667C000-memory.dmp

      Filesize

      9.9MB