Analysis

  • max time kernel
    38s
  • max time network
    29s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 14:02

General

  • Target

    c490e1e62e49b456b0cf3b263c57a4f40cf7efdb7dedc3c5599394f8565150b3N.exe

  • Size

    9.8MB

  • MD5

    e12ef2c4e6a7d3b52db7431f8ec61130

  • SHA1

    ed12c365e2f558169d07a4ab3231188d1dfdd3aa

  • SHA256

    c490e1e62e49b456b0cf3b263c57a4f40cf7efdb7dedc3c5599394f8565150b3

  • SHA512

    99cc94708c54556edae3879969617a82decdb9c3ea5861d0371e8671cacdf054159d76f5c79bcb5655a41bfed9630fa9117ad6702e3ac8da9978616ac3a035c7

  • SSDEEP

    98304:tjYXWBBcI2NFpa27AtJ94H7n2Z0/8xs87BGiLlGn8jg8sQhSYFa:tjoN7VUqH7n8NjGElT7BFa

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c490e1e62e49b456b0cf3b263c57a4f40cf7efdb7dedc3c5599394f8565150b3N.exe
    "C:\Users\Admin\AppData\Local\Temp\c490e1e62e49b456b0cf3b263c57a4f40cf7efdb7dedc3c5599394f8565150b3N.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\System32\notepad.exe
      C:\\Windows\\System32\\notepad.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2124
      • C:\Windows\System32\cmd.exe
        cmd
        3⤵
          PID:2952

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1980-0-0x00000001401BE000-0x00000001401BF000-memory.dmp

      Filesize

      4KB