Analysis

  • max time kernel
    146s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    29-06-2020 07:30

General

  • Target

    00a3fd22323a15f2d5b6f99683c2fb5e2736c96ad179a8d1be1a8943c811e011.exe

  • Size

    254KB

  • MD5

    6312a729c6ff4f5aa81f9aaaa5b66fbb

  • SHA1

    ed01c5e2262c2af450886c6f71be32c9524c7729

  • SHA256

    00a3fd22323a15f2d5b6f99683c2fb5e2736c96ad179a8d1be1a8943c811e011

  • SHA512

    a82bbd8cd304cde1984d1998708f683c4c3c365bf31834cbe65339d4e8dd80d1da2c93dbc52914e548b3b6e878521181ee75758762fddd415da1d31aa64c8044

Score
5/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 18 IoCs
  • Suspicious use of SetThreadContext 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00a3fd22323a15f2d5b6f99683c2fb5e2736c96ad179a8d1be1a8943c811e011.exe
    "C:\Users\Admin\AppData\Local\Temp\00a3fd22323a15f2d5b6f99683c2fb5e2736c96ad179a8d1be1a8943c811e011.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetThreadContext
    PID:1388
    • C:\Users\Admin\AppData\Local\Temp\00a3fd22323a15f2d5b6f99683c2fb5e2736c96ad179a8d1be1a8943c811e011.exe
      "{path}"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe"
        3⤵
          PID:784

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/784-3-0x0000000000000000-mapping.dmp
    • memory/784-4-0x0000000000270000-0x0000000000271000-memory.dmp
      Filesize

      4KB

    • memory/784-5-0x0000000000000000-mapping.dmp
    • memory/1472-0-0x0000000000400000-0x0000000000553000-memory.dmp
      Filesize

      1.3MB

    • memory/1472-1-0x0000000000405907-mapping.dmp
    • memory/1472-2-0x0000000000400000-0x0000000000553000-memory.dmp
      Filesize

      1.3MB