Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29-07-2024 14:58

General

  • Target

    medusa.ac 7 25 2024/medusa.ac_injector.exe

  • Size

    10KB

  • MD5

    53c3ab00f0b9d4f1446ffab27fe0724e

  • SHA1

    9218a42b63e79f4cddcc8090caf0f6f17883a08b

  • SHA256

    2a34c894ecf15bb7fbe12053f45ffd808bca8dc0fc0526d49c0ed526445f4c65

  • SHA512

    8f12365604597e81c255c48bc8d41f8295e93cc0690c695aedb109fdc6e126fc6be1ce2abee7295546dc6e8c960dc611976ca1e8495802d02587836143c500f9

  • SSDEEP

    192:BeF7foyPLXoceWqoxtQ8rPM4F4j8af4ntLZM7nL:0FjogYcXzxfz2XGMDL

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\medusa.ac 7 25 2024\medusa.ac_injector.exe
    "C:\Users\Admin\AppData\Local\Temp\medusa.ac 7 25 2024\medusa.ac_injector.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c pause
      2⤵
        PID:2828

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads